ZyXEL 660HW-D1 91-004-593001B Manuale Utente
![ZyXEL](https://files.manualsbrain.com/attachments/3214a2e9b754be0b3a733d7fd22528bce8dfdece/common/fit/150/50/aafad0ddc2d0e29fd47cd3dd2d9b75f1e404d4f49531d3941fba34789d6b/brand_logo.jpeg)
Codici prodotto
91-004-593001B
P-660H/HW-D Series User’s Guide
31
List of Tables
Table 125 Eight Subnets .................................................................................................... 296
Table 126 Class C Subnet Planning ................................................................................... 296
Table 127 Class B Subnet Planning ................................................................................... 297
Table 128 Firewall Commands ........................................................................................... 300
Table 129 NetBIOS Filter Default Settings ......................................................................... 307
Table 130 System Maintenance Logs ................................................................................ 312
Table 131 System Error Logs ............................................................................................. 313
Table 132 Access Control Logs .......................................................................................... 313
Table 133 TCP Reset Logs ................................................................................................ 314
Table 134 Packet Filter Logs .............................................................................................. 314
Table 135 ICMP Logs ......................................................................................................... 315
Table 136 CDR Logs .......................................................................................................... 315
Table 137 PPP Logs ........................................................................................................... 315
Table 138 UPnP Logs ........................................................................................................ 316
Table 139 Content Filtering Logs ....................................................................................... 316
Table 140 Attack Logs ........................................................................................................ 317
Table 141 IPSec Logs ........................................................................................................ 318
Table 142 IKE Logs ............................................................................................................ 318
Table 143 PKI Logs ............................................................................................................ 321
Table 144 Certificate Path Verification Failure Reason Codes ........................................... 322
Table 145 802.1X Logs ...................................................................................................... 323
Table 146 ACL Setting Notes ............................................................................................. 324
Table 147 ICMP Notes ....................................................................................................... 324
Table 148 Syslog Logs ....................................................................................................... 325
Table 149 RFC-2408 ISAKMP Payload Types ................................................................... 325
Table 150 IEEE 802.11g ..................................................................................................... 332
Table 151 Wireless Security Levels ................................................................................... 333
Table 152 Comparison of EAP Authentication Types ......................................................... 336
Table 153 Wireless Security Relational Matrix ................................................................... 340
Table 126 Class C Subnet Planning ................................................................................... 296
Table 127 Class B Subnet Planning ................................................................................... 297
Table 128 Firewall Commands ........................................................................................... 300
Table 129 NetBIOS Filter Default Settings ......................................................................... 307
Table 130 System Maintenance Logs ................................................................................ 312
Table 131 System Error Logs ............................................................................................. 313
Table 132 Access Control Logs .......................................................................................... 313
Table 133 TCP Reset Logs ................................................................................................ 314
Table 134 Packet Filter Logs .............................................................................................. 314
Table 135 ICMP Logs ......................................................................................................... 315
Table 136 CDR Logs .......................................................................................................... 315
Table 137 PPP Logs ........................................................................................................... 315
Table 138 UPnP Logs ........................................................................................................ 316
Table 139 Content Filtering Logs ....................................................................................... 316
Table 140 Attack Logs ........................................................................................................ 317
Table 141 IPSec Logs ........................................................................................................ 318
Table 142 IKE Logs ............................................................................................................ 318
Table 143 PKI Logs ............................................................................................................ 321
Table 144 Certificate Path Verification Failure Reason Codes ........................................... 322
Table 145 802.1X Logs ...................................................................................................... 323
Table 146 ACL Setting Notes ............................................................................................. 324
Table 147 ICMP Notes ....................................................................................................... 324
Table 148 Syslog Logs ....................................................................................................... 325
Table 149 RFC-2408 ISAKMP Payload Types ................................................................... 325
Table 150 IEEE 802.11g ..................................................................................................... 332
Table 151 Wireless Security Levels ................................................................................... 333
Table 152 Comparison of EAP Authentication Types ......................................................... 336
Table 153 Wireless Security Relational Matrix ................................................................... 340