Restarting the Network

C-12

Appendix D

 

Firewall Log Formats

 

Action List

D-1

Field List

D-1

Outbound Log

D-1

Inbound Log

D-2

Other IP Traffic

D-2

Router Operation

D-3

Other Connections and Traffic to this Router

D-4

DoS Attack/Scan

D-4

Access Block Site

D-6

All Web Sites and News Groups Visited

D-6

System Admin Sessions

D-6

Policy Administration LOG

D-7

Appendix E

 

Wireless Networking Basics

 

Wireless Networking Overview

E-1

Infrastructure Mode

E-1

Ad Hoc Mode (Peer-to-Peer Workgroup)

E-2

Network Name: Extended Service Set Identification (ESSID)

E-2

Authentication and WEP Data Encryption

E-2

802.11 Authentication

E-3

Open System Authentication

E-3

Shared Key Authentication

E-4

Overview of WEP Parameters

E-5

Key Size

E-6

WEP Configuration Options

E-7

Wireless Channels

E-7

WPA Wireless Security

E-8

How Does WPA Compare to WEP?

E-9

How Does WPA Compare to IEEE 802.11i?

E-10

What are the Key Features of WPA Security?

E-10

WPA Authentication: Enterprise-level User

 

Authentication via 802.1x/EAP and RADIUS

E-12

WPA Data Encryption Key Management

E-14

Contents

xi

201-10301-02, May 2005

Page 11
Image 11
NETGEAR FWG114P v2 manual Appendix D Firewall Log Formats