ZyWALL 5 User’s Guide
40
Table 4 Feature Specifications ........................................................................................... 537
Table 5 Compatible ZyXEL WLAN Cards and Security Features ...................................... 538
Table 6 Console/Dial Backup Port Pin Assignments .......................................................... 540
Table 7 North American AC Power Adaptor Specifications ................................................ 540
Table 8 European Union AC Power Adaptor Specifications ............................................... 541
Table 9 UK AC Power Adaptor Specifications .................................................................... 541
Table 10 Japan AC Power Adaptor Specifications ............................................................. 541
Table 11 Australia and New Zealand AC Power Adaptor Specification .............................. 542
Table 12 Classes of IP Addresses ..................................................................................... 555
Table 13 Allowed IP Address Range By Class ................................................................... 556
Table 14 “Natural” Masks .................................................................................................. 556
Table 15 Alternative Subnet Mask Notation ....................................................................... 557
Table 16 Two Subnets Example ......................................................................................... 557
Table 17 Subnet 1 .............................................................................................................. 558
Table 18 Subnet 2 .............................................................................................................. 558
Table 19 Subnet 1 .............................................................................................................. 559
Table 20 Subnet 2 .............................................................................................................. 559
Table 21 Subnet 3 .............................................................................................................. 559
Table 22 Subnet 4 .............................................................................................................. 560
Table 23 Eight Subnets ...................................................................................................... 560
Table 24 Class C Subnet Planning ..................................................................................... 560
Table 25 Class B Subnet Planning ..................................................................................... 561
Table 26 IEEE802.11g ........................................................................................................ 575
Table 27 Comparison of EAP Authentication Types ........................................................... 581
Table 28 Wireless Security Relational Matrix ..................................................................... 582
Table 29 SIP Call Progression ........................................................................................... 589
Table 30 Firewall Commands ............................................................................................. 621
Table 31 NetBIOS Filter Default Settings ........................................................................... 628
Table 32 Certificates Commands ....................................................................................... 631
Table 33 Brute-Force Password Guessing Protection Commands .................................... 635
Table 34 System Maintenance Logs .................................................................................. 639
Table 35 System Error Logs ............................................................................................... 640
Table 36 Access Control Logs ............................................................................................ 641
Table 37 TCP Reset Logs .................................................................................................. 641
Table 38 Packet Filter Logs ................................................................................................ 642
Table 39 ICMP Logs ........................................................................................................... 642
Table 40 CDR Logs ............................................................................................................ 643
Table 41 PPP Logs .............................................................................................................643
Table 42 UPnP Logs .......................................................................................................... 643
Table 43 Content Filtering Logs ......................................................................................... 643
Table 44 Attack Logs ..........................................................................................................644
Table 45 Remote Management Logs ................................................................................. 645
Table 46 Wireless Logs ...................................................................................................... 646