List of Tables

Table 297 Device HA Logs ..................................................................................................................

797

Table 298 Routing Protocol Logs .........................................................................................................

799

Table 299 NAT Logs ............................................................................................................................

802

Table 300 PKI Logs .............................................................................................................................

803

Table 301 Interface Logs .....................................................................................................................

805

Table 302 WLAN Logs .........................................................................................................................

809

Table 303 Account Logs .......................................................................................................................

811

Table 304 Port Grouping Logs ..............................................................................................................

811

Table 305 Force Authentication Logs ...................................................................................................

811

Table 306 File Manager Logs ..............................................................................................................

812

Table 307 E-mail Daily Report Logs ....................................................................................................

812

Table 308 Commonly Used Services ...................................................................................................

815

Table 309 IEEE 802.11g ......................................................................................................................

835

Table 310 Wireless Security Levels .....................................................................................................

836

Table 311 Comparison of EAP Authentication Types ..........................................................................

839

Table 312 Wireless Security Relational Matrix ....................................................................................

842

50

 

ZyWALL USG 100/200 Series User’s Guide