List of Tables
P-660HWP-Dx User’s Guide
38
Table 125 Certificate Path Verification Failure Reason Codes ............................................................ 285
Table 126 ACL Setting Notes ...................................... ........................................................................ 285
Table 127 ICMP Notes ......................................................................................................................... 286
Table 128 Syslog Logs ................................................ ........................................................................ 287
Table 129 RFC-2408 ISAKMP Payload Types .................................................................................... 287
Table 130 Firmware Upgrade ...................................................................................... ........................289
Table 131 Maintenance > Tools > Configuration ................................................................................291
Table 132 Maintenance Restore Configuration ..................................................... ..............................292
Table 133 Diagnostic: General ................................................. ........................................................... 295
Table 134 Diagnostic: DSL Line .................................................. ........................................................ 296
Table 135 Hardware Specifications ............................................................................. ........................305
Table 136 Firmware Specifications ...................................................................................................... 305
Table 137 Wireless Firmware Specifications ....................................................................................... 307
Table 138 Standards Supported .......................................................................................................... 308
Table 139 IEEE 802.11g ......................................................................................................................315
Table 140 Wireless Security Levels ..................................................................................................... 316
Table 141 Comparison of EAP Authentication Types ..........................................................................319
Table 142 Wireless Security Relational Matrix ......................................... ........................................... 322
Table 143 Abbreviations Used in the Example Internal SPTGEN Screens Table ............................... 328
Table 144 Menu 1 General Setup ........................................................................................................ 328
Table 145 Menu 3 ................................................................................................................................ 328
Table 146 Menu 4 Internet Access Setup ............................................................................................ 330
Table 147 Menu 12 .............................................................................................................................. 332
Table 148 Menu 15 SUA Server Setup ................................................................................................ 332
Table 149 Menu 21.1 Filter Set #1 ....................................................................................................... 334
Table 150 Menu 21.1 Filter Set #2 ....................................................................................................... 335
Table 151 Menu 23 System Menus .................................................................................... .................337
Table 152 Menu 24.11 Remote Management Control ......................................................................... 338
Table 153 Command Examples ........................................................................................................... 339
Table 154 Classes of IP Addresses ..................................................................................................... 357
Table 155 Allowed IP Address Range By Class .................................................................................. 358
Table 156 “Natural” Masks ................................................................................................................... 358
Table 157 Alternative Subnet Mask Notation ....................................................................................... 359
Table 158 Two Subnets Example ........................................................................................................ 359
Table 159 Subnet 1 .............................................................................................................................. 360
Table 160 Subnet 2 .............................................................................................................................. 360
Table 161 Subnet 1 .............................................................................................................................. 361
Table 162 Subnet 2 .............................................................................................................................. 361
Table 163 Subnet 3 .............................................................................................................................. 361
Table 164 Subnet 4 .............................................................................................................................. 361
Table 165 Eight Subnets ...................................................................................................................... 362
Table 166 Class C Subnet Planning .................................................................................................... 362
Table 167 Class B Subnet Planning ............................................................................ ........................362