ZyXEL Communications NBG334S User Manual page 25

802.11g wireless firewall router
Hide thumbs Also See for NBG334S:
Table of Contents

Advertisement

List of Tables
Table 82 Content Filtering Logs ........................................................................................................... 184
Table 83 Attack Logs ........................................................................................................................... 185
Table 84 PKI Logs ............................................................................................................................... 186
Table 85 802.1X Logs .......................................................................................................................... 187
Table 86 ACL Setting Notes ................................................................................................................ 188
Table 87 ICMP Notes ........................................................................................................................... 188
Table 88 Syslog Logs .......................................................................................................................... 189
Table 89 RFC-2408 ISAKMP Payload Types ...................................................................................... 189
Table 90 Maintenance > Tools > Firmware .......................................................................................... 191
Table 91 Maintenance Restore Configuration ..................................................................................... 193
Table 92 Maintenance > Config Mode > General ............................................................................... 197
Table 93 Advanced Configuration Options ......................................................................................... 198
Table 94 Maintenance > Sys OP Mode > General ............................................................................. 201
Table 95 Hardware Features ................................................................................................................211
Table 96 Firmware Features .................................................................................................................211
Table 97 Feature Specifications ........................................................................................................... 213
Table 98 Standards Supported ............................................................................................................ 213
Table 99 Subnet Mask - Identifying Network Number ......................................................................... 224
Table 100 Subnet Masks ..................................................................................................................... 225
Table 101 Maximum Host Numbers .................................................................................................... 225
Table 102 Alternative Subnet Mask Notation ....................................................................................... 225
Table 103 Subnet 1 .............................................................................................................................. 227
Table 104 Subnet 2 .............................................................................................................................. 228
Table 105 Subnet 3 .............................................................................................................................. 228
Table 106 Subnet 4 .............................................................................................................................. 228
Table 107 Eight Subnets ...................................................................................................................... 228
Table 108 24-bit Network Number Subnet Planning ............................................................................ 229
Table 109 16-bit Network Number Subnet Planning ............................................................................ 229
Table 110 IEEE 802.11g ...................................................................................................................... 251
Table 111 Comparison of EAP Authentication Types ........................................................................... 254
Table 112 Wireless Security Relational Matrix ..................................................................................... 257
Table 113 Examples of Services .......................................................................................................... 259
25
NBG334S User's Guide

Advertisement

Table of Contents
loading

Table of Contents