List of Tables
Table 297 Device HA Logs ..................................................................................................................
797
Table 298 Routing Protocol Logs .........................................................................................................
799
Table 299 NAT Logs ............................................................................................................................
802
Table 300 PKI Logs .............................................................................................................................
803
Table 301 Interface Logs .....................................................................................................................
805
Table 302 WLAN Logs .........................................................................................................................
809
Table 303 Account Logs .......................................................................................................................
811
Table 304 Port Grouping Logs ..............................................................................................................
Table 305 Force Authentication Logs ...................................................................................................
Table 306 File Manager Logs ..............................................................................................................
812
Table 307 E-mail Daily Report Logs ....................................................................................................
Table 308 Commonly Used Services ...................................................................................................
815
Table 309 IEEE 802.11g ......................................................................................................................
835
Table 310 Wireless Security Levels .....................................................................................................
836
Table 311 Comparison of EAP Authentication Types ..........................................................................
839
Table 312 Wireless Security Relational Matrix ....................................................................................
842
50
ZyWALL USG 100/200 Series User’s Guide