Zyxel-communications P-660H-T Series Manual de usuario Pagina 36

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 466
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 35
P-660H/HW-T Series User’ Guide
35 List of Tables
Table 125 Allowed IP Address Range By Class ................................................................. 377
Table 126 “Natural” Masks ................................................................................................ 377
Table 127 Alternative Subnet Mask Notation ..................................................................... 378
Table 128 Two Subnets Example ....................................................................................... 378
Table 129 Subnet 1 ............................................................................................................379
Table 130 Subnet 2 ............................................................................................................379
Table 131 Subnet 1 ............................................................................................................380
Table 132 Subnet 2 ............................................................................................................380
Table 133 Subnet 3 ............................................................................................................380
Table 134 Subnet 4 ............................................................................................................381
Table 135 Eight Subnets .................................................................................................... 381
Table 136 Class C Subnet Planning ................................................................................... 381
Table 137 Class B Subnet Planning ................................................................................... 382
Table 138 Firewall Commands ........................................................................................... 388
Table 139 NetBIOS Filter Default Settings ......................................................................... 395
Table 140 IEEE 802.11g ..................................................................................................... 408
Table 141 Comparison of EAP Authentication Types ......................................................... 412
Table 142 Wireless Security Relational Matrix ................................................................... 413
Table 143 System Maintenance Logs ................................................................................ 414
Table 144 System Error Logs ............................................................................................. 415
Table 145 Access Control Logs .......................................................................................... 415
Table 146 TCP Reset Logs ................................................................................................ 416
Table 147 Packet Filter Logs .............................................................................................. 416
Table 148 ICMP Logs ......................................................................................................... 417
Table 149 CDR Logs .......................................................................................................... 417
Table 150 PPP Logs ........................................................................................................... 417
Table 151 UPnP Logs ........................................................................................................ 418
Table 152 Content Filtering Logs ....................................................................................... 418
Table 153 Attack Logs ........................................................................................................ 419
Table 154 IPSec Logs ........................................................................................................ 420
Table 155 IKE Logs ............................................................................................................420
Table 156 PKI Logs ............................................................................................................423
Table 157 Certificate Path Verification Failure Reason Codes ........................................... 424
Table 158 802.1X Logs ...................................................................................................... 425
Table 159 ACL Setting Notes ............................................................................................. 426
Table 160 ICMP Notes ....................................................................................................... 426
Table 161 Syslog Logs ....................................................................................................... 427
Table 162 RFC-2408 ISAKMP Payload Types ................................................................... 427
Table 163 Abbreviations Used in the Example Internal SPTGEN Screens Table .............. 432
Table 164 Menu 1 General Setup (SMT Menu 1) .............................................................. 433
Table 165 Menu 3 (SMT Menu 3 ) ...................................................................................... 433
Table 166 Menu 4 Internet Access Setup (SMT Menu 4) .................................................. 436
Table 167 Menu 12 (SMT Menu 12) ................................................................................... 438
Vista de pagina 35
1 2 ... 31 32 33 34 35 36 37 38 39 40 41 ... 465 466

Comentarios a estos manuales

Sin comentarios