ZyWALL 5/35/70 Series User’s Guide

Table 254 Classes of IP Addresses ...................................................................................

690

Table 255 Allowed IP Address Range By Class .................................................................

691

Table 256 “Natural” Masks ................................................................................................

691

Table 257 Alternative Subnet Mask Notation .....................................................................

692

Table 258 Two Subnets Example .......................................................................................

692

Table 259 Subnet 1 ............................................................................................................

693

Table 260 Subnet 2 ............................................................................................................

693

Table 261 Subnet 1 ............................................................................................................

694

Table 262 Subnet 2 ............................................................................................................

694

Table 263 Subnet 3 ............................................................................................................

694

Table 264 Subnet 4 ............................................................................................................

695

Table 265 Eight Subnets ....................................................................................................

695

Table 266 Class C Subnet Planning ...................................................................................

695

Table 267 Class B Subnet Planning ...................................................................................

696

Table 268 IEEE802.11g ......................................................................................................

708

Table 269 Comparison of EAP Authentication Types .........................................................

714

Table 270 Wireless Security Relational Matrix ...................................................................

715

Table 271 Firewall Commands ...........................................................................................

752

Table 272 NetBIOS Filter Default Settings .........................................................................

759

Table 273 Certificates Commands .....................................................................................

762

Table 274 Brute-Force Password Guessing Protection Commands ..................................

766

Table 275 System Maintenance Logs ................................................................................

770

Table 276 System Error Logs .............................................................................................

771

Table 277 Access Control Logs ..........................................................................................

772

Table 278 TCP Reset Logs ................................................................................................

773

Table 279 Packet Filter Logs ..............................................................................................

773

Table 280 ICMP Logs .........................................................................................................

774

Table 281 CDR Logs ..........................................................................................................

774

Table 282 PPP Logs ...........................................................................................................

774

Table 283 UPnP Logs ........................................................................................................

775

Table 284 Content Filtering Logs .......................................................................................

775

Table 285 Attack Logs ........................................................................................................

776

Table 286 Remote Management Logs ...............................................................................

777

Table 287 Wireless Logs ....................................................................................................

778

Table 288 IPSec Logs ........................................................................................................

778

Table 289 IKE Logs ............................................................................................................

779

Table 290 PKI Logs ............................................................................................................

782

Table 291 Certificate Path Verification Failure Reason Codes ...........................................

783

Table 292 802.1X Logs ......................................................................................................

783

Table 293 ACL Setting Notes .............................................................................................

784

Table 294 ICMP Notes .......................................................................................................

785

Table 295 IDP Logs ............................................................................................................

786

Table 296 AV Logs .............................................................................................................

787

List of Tables

46