ZyWALL 5/35/70 Series User’s Guide

Table 254 Classes of IP Addresses ...................................................................................

694

Table 255 Allowed IP Address Range By Class .................................................................

695

Table 256 “Natural” Masks ................................................................................................

695

Table 257 Alternative Subnet Mask Notation .....................................................................

696

Table 258 Two Subnets Example .......................................................................................

696

Table 259 Subnet 1 ............................................................................................................

697

Table 260 Subnet 2 ............................................................................................................

697

Table 261 Subnet 1 ............................................................................................................

698

Table 262 Subnet 2 ............................................................................................................

698

Table 263 Subnet 3 ............................................................................................................

698

Table 264 Subnet 4 ............................................................................................................

699

Table 265 Eight Subnets ....................................................................................................

699

Table 266 Class C Subnet Planning ...................................................................................

699

Table 267 Class B Subnet Planning ...................................................................................

700

Table 268 IEEE802.11g ......................................................................................................

712

Table 269 Comparison of EAP Authentication Types .........................................................

718

Table 270 Wireless Security Relational Matrix ...................................................................

719

Table 271 Firewall Commands ...........................................................................................

756

Table 272 NetBIOS Filter Default Settings .........................................................................

763

Table 273 Certificates Commands .....................................................................................

766

Table 274 Brute-Force Password Guessing Protection Commands ..................................

770

Table 275 System Maintenance Logs ................................................................................

774

Table 276 System Error Logs .............................................................................................

775

Table 277 Access Control Logs ..........................................................................................

776

Table 278 TCP Reset Logs ................................................................................................

777

Table 279 Packet Filter Logs ..............................................................................................

777

Table 280 ICMP Logs .........................................................................................................

778

Table 281 CDR Logs ..........................................................................................................

778

Table 282 PPP Logs ...........................................................................................................

778

Table 283 UPnP Logs ........................................................................................................

779

Table 284 Content Filtering Logs .......................................................................................

779

Table 285 Attack Logs ........................................................................................................

780

Table 286 Remote Management Logs ...............................................................................

781

Table 287 Wireless Logs ....................................................................................................

782

Table 288 IPSec Logs ........................................................................................................

782

Table 289 IKE Logs ............................................................................................................

783

Table 290 PKI Logs ............................................................................................................

786

Table 291 Certificate Path Verification Failure Reason Codes ...........................................

787

Table 292 802.1X Logs ......................................................................................................

787

Table 293 ACL Setting Notes .............................................................................................

788

Table 294 ICMP Notes .......................................................................................................

789

Table 295 IDP Logs ............................................................................................................

790

Table 296 AV Logs .............................................................................................................

791

List of Tables

50