P-661H/HW Series User’s Guide
Table 125 Troubleshooting Accessing the ZyXEL Device ..................................................
295
Table 126 Device ................................................................................................................
297
Table 127 Firmware ............................................................................................................
298
Table 128 Classes of IP Addresses ...................................................................................
319
Table 129 Allowed IP Address Range By Class .................................................................
320
Table 130 “Natural” Masks .................................................................................................
Table 131 Alternative Subnet Mask Notation .....................................................................
321
Table 132 Two Subnets Example .......................................................................................
Table 133 Subnet 1 ............................................................................................................
322
Table 134 Subnet 2 ............................................................................................................
Table 135 Subnet 1 ............................................................................................................
323
Table 136 Subnet 2 ............................................................................................................
Table 137 Subnet 3 ............................................................................................................
Table 138 Subnet 4 ............................................................................................................
324
Table 139 Eight Subnets ....................................................................................................
Table 140 Class C Subnet Planning ...................................................................................
Table 141 Class B Subnet Planning ...................................................................................
325
Table 142 Firewall Commands ...........................................................................................
329
Table 143 NetBIOS Filter Default Settings .........................................................................
336
Table 144 System Maintenance Logs ................................................................................
339
Table 145 System Error Logs .............................................................................................
340
Table 146 Access Control Logs ..........................................................................................
Table 147 TCP Reset Logs ................................................................................................
341
Table 148 Packet Filter Logs ..............................................................................................
Table 149 ICMP Logs .........................................................................................................
342
Table 150 CDR Logs ..........................................................................................................
Table 151 PPP Logs ...........................................................................................................
Table 152 UPnP Logs ........................................................................................................
343
Table 153 Content Filtering Logs .......................................................................................
Table 154 Attack Logs ........................................................................................................
344
Table 155 IPSec Logs ........................................................................................................
345
Table 156 IKE Logs ............................................................................................................
Table 157 PKI Logs ............................................................................................................
348
Table 158 Certificate Path Verification Failure Reason Codes ...........................................
349
Table 159 802.1X Logs ......................................................................................................
350
Table 160 ACL Setting Notes .............................................................................................
351
Table 161 ICMP Notes .......................................................................................................
Table 162 Syslog Logs .......................................................................................................
352
Table 163 RFC-2408 ISAKMP Payload Types ...................................................................
Table 164 IEEE 802.11g .....................................................................................................
359
Table 165 Wireless Security Levels ...................................................................................
360
Table 166 Comparison of EAP Authentication Types .........................................................
363
Table 167 Wireless Security Relational Matrix ...................................................................
367
32
List of Tables