ZyXEL Communications NBG334W User Manual

Page 27

Advertising
background image

List of Tables

NBG334W User’s Guide

27

Table 82 Packet Filter Logs ................................................................................................................. 199
Table 83 ICMP Logs ............................................................................................................................ 199
Table 84 CDR Logs ............................................................................................................................. 200
Table 85 PPP Logs .............................................................................................................................. 200
Table 86 UPnP Logs ............................................................................................................................ 200
Table 87 Content Filtering Logs ........................................................................................................... 200
Table 88 Attack Logs ........................................................................................................................... 201
Table 89 PKI Logs ............................................................................................................................... 202
Table 90 802.1X Logs .......................................................................................................................... 203
Table 91 ACL Setting Notes ................................................................................................................ 204
Table 92 ICMP Notes ........................................................................................................................... 204
Table 93 Syslog Logs .......................................................................................................................... 205
Table 94 RFC-2408 ISAKMP Payload Types ...................................................................................... 205
Table 95 Maintenance > Tools > Firmware .......................................................................................... 207
Table 96 Maintenance Restore Configuration ..................................................................................... 209
Table 97 Maintenance > Config Mode > General ............................................................................... 213
Table 98 Advanced Configuration Options ......................................................................................... 214
Table 99 Maintenance > Sys OP Mode > General ............................................................................. 217
Table 100 Hardware Features ............................................................................................................. 229
Table 101 Firmware Features .............................................................................................................. 229
Table 102 Feature Specifications ......................................................................................................... 231
Table 103 Standards Supported .......................................................................................................... 231
Table 104 Subnet Mask - Identifying Network Number ....................................................................... 242
Table 105 Subnet Masks ..................................................................................................................... 243
Table 106 Maximum Host Numbers .................................................................................................... 243
Table 107 Alternative Subnet Mask Notation ....................................................................................... 243
Table 108 Subnet 1 .............................................................................................................................. 245
Table 109 Subnet 2 .............................................................................................................................. 246
Table 110 Subnet 3 .............................................................................................................................. 246
Table 111 Subnet 4 .............................................................................................................................. 246
Table 112 Eight Subnets ...................................................................................................................... 246
Table 113 24-bit Network Number Subnet Planning ............................................................................ 247
Table 114 16-bit Network Number Subnet Planning ............................................................................ 247
Table 115 IEEE 802.11g ...................................................................................................................... 269
Table 116 Comparison of EAP Authentication Types .......................................................................... 272
Table 117 Wireless Security Relational Matrix ..................................................................................... 275
Table 118 Examples of Services .......................................................................................................... 277

Advertising