P-661H/HW Series User’s Guide

Table 125 Troubleshooting Accessing the ZyXEL Device ..................................................

295

Table 126 Device ................................................................................................................

297

Table 127 Firmware ............................................................................................................

298

Table 128 Classes of IP Addresses ...................................................................................

319

Table 129 Allowed IP Address Range By Class .................................................................

320

Table 130 “Natural” Masks .................................................................................................

320

Table 131 Alternative Subnet Mask Notation .....................................................................

321

Table 132 Two Subnets Example .......................................................................................

321

Table 133 Subnet 1 ............................................................................................................

322

Table 134 Subnet 2 ............................................................................................................

322

Table 135 Subnet 1 ............................................................................................................

323

Table 136 Subnet 2 ............................................................................................................

323

Table 137 Subnet 3 ............................................................................................................

323

Table 138 Subnet 4 ............................................................................................................

324

Table 139 Eight Subnets ....................................................................................................

324

Table 140 Class C Subnet Planning ...................................................................................

324

Table 141 Class B Subnet Planning ...................................................................................

325

Table 142 Firewall Commands ...........................................................................................

329

Table 143 NetBIOS Filter Default Settings .........................................................................

336

Table 144 System Maintenance Logs ................................................................................

339

Table 145 System Error Logs .............................................................................................

340

Table 146 Access Control Logs ..........................................................................................

340

Table 147 TCP Reset Logs ................................................................................................

341

Table 148 Packet Filter Logs ..............................................................................................

341

Table 149 ICMP Logs .........................................................................................................

342

Table 150 CDR Logs ..........................................................................................................

342

Table 151 PPP Logs ...........................................................................................................

342

Table 152 UPnP Logs ........................................................................................................

343

Table 153 Content Filtering Logs .......................................................................................

343

Table 154 Attack Logs ........................................................................................................

344

Table 155 IPSec Logs ........................................................................................................

345

Table 156 IKE Logs ............................................................................................................

345

Table 157 PKI Logs ............................................................................................................

348

Table 158 Certificate Path Verification Failure Reason Codes ...........................................

349

Table 159 802.1X Logs ......................................................................................................

350

Table 160 ACL Setting Notes .............................................................................................

351

Table 161 ICMP Notes .......................................................................................................

351

Table 162 Syslog Logs .......................................................................................................

352

Table 163 RFC-2408 ISAKMP Payload Types ...................................................................

352

Table 164 IEEE 802.11g .....................................................................................................

359

Table 165 Wireless Security Levels ...................................................................................

360

Table 166 Comparison of EAP Authentication Types .........................................................

363

Table 167 Wireless Security Relational Matrix ...................................................................

367

32

List of Tables