P-660H/HW/W-T Series User’ Guide

Table 125 Allowed IP Address Range By Class .................................................................

377

Table 126 “Natural” Masks ................................................................................................

377

Table 127 Alternative Subnet Mask Notation .....................................................................

378

Table 128 Two Subnets Example .......................................................................................

378

Table 129 Subnet 1 ............................................................................................................

379

Table 130 Subnet 2 ............................................................................................................

379

Table 131 Subnet 1 ............................................................................................................

380

Table 132 Subnet 2 ............................................................................................................

380

Table 133 Subnet 3 ............................................................................................................

380

Table 134 Subnet 4 ............................................................................................................

381

Table 135 Eight Subnets ....................................................................................................

381

Table 136 Class C Subnet Planning ...................................................................................

381

Table 137 Class B Subnet Planning ...................................................................................

382

Table 138 Firewall Commands ...........................................................................................

388

Table 139 NetBIOS Filter Default Settings .........................................................................

395

Table 140 System Maintenance Logs ................................................................................

404

Table 141 System Error Logs .............................................................................................

405

Table 142 Access Control Logs ..........................................................................................

405

Table 143 TCP Reset Logs ................................................................................................

406

Table 144 Packet Filter Logs ..............................................................................................

406

Table 145 ICMP Logs .........................................................................................................

407

Table 146 CDR Logs ..........................................................................................................

407

Table 147 PPP Logs ...........................................................................................................

407

Table 148 UPnP Logs ........................................................................................................

408

Table 149 Content Filtering Logs .......................................................................................

408

Table 150 Attack Logs ........................................................................................................

409

Table 151 IPSec Logs ........................................................................................................

410

Table 152 IKE Logs ............................................................................................................

410

Table 153 PKI Logs ............................................................................................................

413

Table 154 Certificate Path Verification Failure Reason Codes ...........................................

414

Table 155 802.1X Logs ......................................................................................................

415

Table 156 ACL Setting Notes .............................................................................................

416

Table 157 ICMP Notes .......................................................................................................

416

Table 158 Syslog Logs .......................................................................................................

417

Table 159 RFC-2408 ISAKMP Payload Types ...................................................................

417

Table 160 IEEE 802.11g .....................................................................................................

424

Table 161 Comparison of EAP Authentication Types .........................................................

428

Table 162 Wireless Security Relational Matrix ...................................................................

429

Table 163 Abbreviations Used in the Example Internal SPTGEN Screens Table ..............

432

Table 164 Menu 1 General Setup (SMT Menu 1) ..............................................................

433

Table 165 Menu 3 (SMT Menu 3 ) ......................................................................................

433

Table 166 Menu 4 Internet Access Setup (SMT Menu 4) ..................................................

436

Table 167 Menu 12 (SMT Menu 12) ...................................................................................

438

35

List of Tables