P-660H/HW/W-T Series User’ Guide
Table 125 Allowed IP Address Range By Class .................................................................
377
Table 126 “Natural” Masks ................................................................................................
Table 127 Alternative Subnet Mask Notation .....................................................................
378
Table 128 Two Subnets Example .......................................................................................
Table 129 Subnet 1 ............................................................................................................
379
Table 130 Subnet 2 ............................................................................................................
Table 131 Subnet 1 ............................................................................................................
380
Table 132 Subnet 2 ............................................................................................................
Table 133 Subnet 3 ............................................................................................................
Table 134 Subnet 4 ............................................................................................................
381
Table 135 Eight Subnets ....................................................................................................
Table 136 Class C Subnet Planning ...................................................................................
Table 137 Class B Subnet Planning ...................................................................................
382
Table 138 Firewall Commands ...........................................................................................
388
Table 139 NetBIOS Filter Default Settings .........................................................................
395
Table 140 System Maintenance Logs ................................................................................
404
Table 141 System Error Logs .............................................................................................
405
Table 142 Access Control Logs ..........................................................................................
Table 143 TCP Reset Logs ................................................................................................
406
Table 144 Packet Filter Logs ..............................................................................................
Table 145 ICMP Logs .........................................................................................................
407
Table 146 CDR Logs ..........................................................................................................
Table 147 PPP Logs ...........................................................................................................
Table 148 UPnP Logs ........................................................................................................
408
Table 149 Content Filtering Logs .......................................................................................
Table 150 Attack Logs ........................................................................................................
409
Table 151 IPSec Logs ........................................................................................................
410
Table 152 IKE Logs ............................................................................................................
Table 153 PKI Logs ............................................................................................................
413
Table 154 Certificate Path Verification Failure Reason Codes ...........................................
414
Table 155 802.1X Logs ......................................................................................................
415
Table 156 ACL Setting Notes .............................................................................................
416
Table 157 ICMP Notes .......................................................................................................
Table 158 Syslog Logs .......................................................................................................
417
Table 159 RFC-2408 ISAKMP Payload Types ...................................................................
Table 160 IEEE 802.11g .....................................................................................................
424
Table 161 Comparison of EAP Authentication Types .........................................................
428
Table 162 Wireless Security Relational Matrix ...................................................................
429
Table 163 Abbreviations Used in the Example Internal SPTGEN Screens Table ..............
432
Table 164 Menu 1 General Setup (SMT Menu 1) ..............................................................
433
Table 165 Menu 3 (SMT Menu 3 ) ......................................................................................
Table 166 Menu 4 Internet Access Setup (SMT Menu 4) ..................................................
436
Table 167 Menu 12 (SMT Menu 12) ...................................................................................
438
35
List of Tables