Руководство Пользователя для ZyXEL NBG-318S

Скачать
Страница из 286
  List of Tables
NBG-318S User’s Guide
25
Table 82 Content Filtering Logs  ........................................................................................................... 192
Table 83 Attack Logs   ........................................................................................................................... 193
Table 84 PKI Logs   ............................................................................................................................... 194
Table 85 802.1X Logs  .......................................................................................................................... 195
Table 86 ACL Setting Notes   ................................................................................................................ 196
Table 87 ICMP Notes  ........................................................................................................................... 196
Table 88 Syslog Logs   .......................................................................................................................... 197
Table 89 RFC-2408 ISAKMP Payload Types   ...................................................................................... 197
Table 90 Maintenance > Tools > Firmware  .......................................................................................... 199
Table 91 Maintenance Restore Configuration   ..................................................................................... 201
Table 92 Maintenance > Config Mode > General    ............................................................................... 205
Table 93 Advanced Configuration Options    ......................................................................................... 206
Table 94 Maintenance > Sys OP Mode > General    ............................................................................. 208
Table 95 Hardware Features   ............................................................................................................... 219
Table 96 Firmware Features  ................................................................................................................ 220
Table 97 Standards Supported   ............................................................................................................ 221
Table 98 Subnet Mask - Identifying Network Number   ......................................................................... 232
Table 99 Subnet Masks   ....................................................................................................................... 233
Table 100 Maximum Host Numbers   .................................................................................................... 233
Table 101 Alternative Subnet Mask Notation  ....................................................................................... 233
Table 102 Subnet 1  .............................................................................................................................. 235
Table 103 Subnet 2  .............................................................................................................................. 236
Table 104 Subnet 3  .............................................................................................................................. 236
Table 105 Subnet 4  .............................................................................................................................. 236
Table 106 Eight Subnets  ...................................................................................................................... 236
Table 107 24-bit Network Number Subnet Planning  ............................................................................ 237
Table 108 16-bit Network Number Subnet Planning  ............................................................................ 237
Table 109 IEEE 802.11g   ...................................................................................................................... 259
Table 110 Comparison of EAP Authentication Types   .......................................................................... 262
Table 111 Wireless Security Relational Matrix   ..................................................................................... 265
Table 112 Examples of Services  .......................................................................................................... 267