User's Manual Part 1

P-660H/HW/W-T Series User’ Guide
35 List of Tables
Table 125 Allowed IP Address Range By Class ................................................................. 377
Table 126 “Natural” Masks ................................................................................................ 377
Table 127 Alternative Subnet Mask Notation ..................................................................... 378
Table 128 Two Subnets Example ....................................................................................... 378
Table 129 Subnet 1 ............................................................................................................379
Table 130 Subnet 2 ............................................................................................................379
Table 131 Subnet 1 ............................................................................................................380
Table 132 Subnet 2 ............................................................................................................380
Table 133 Subnet 3 ............................................................................................................380
Table 134 Subnet 4 ............................................................................................................381
Table 135 Eight Subnets .................................................................................................... 381
Table 136 Class C Subnet Planning ................................................................................... 381
Table 137 Class B Subnet Planning ................................................................................... 382
Table 138 Firewall Commands ........................................................................................... 388
Table 139 NetBIOS Filter Default Settings ......................................................................... 395
Table 140 System Maintenance Logs ................................................................................ 404
Table 141 System Error Logs ............................................................................................. 405
Table 142 Access Control Logs .......................................................................................... 405
Table 143 TCP Reset Logs ................................................................................................ 406
Table 144 Packet Filter Logs .............................................................................................. 406
Table 145 ICMP Logs ......................................................................................................... 407
Table 146 CDR Logs .......................................................................................................... 407
Table 147 PPP Logs ........................................................................................................... 407
Table 148 UPnP Logs ........................................................................................................ 408
Table 149 Content Filtering Logs ....................................................................................... 408
Table 150 Attack Logs ........................................................................................................ 409
Table 151 IPSec Logs ........................................................................................................ 410
Table 152 IKE Logs ............................................................................................................410
Table 153 PKI Logs ............................................................................................................413
Table 154 Certificate Path Verification Failure Reason Codes ........................................... 414
Table 155 802.1X Logs ...................................................................................................... 415
Table 156 ACL Setting Notes ............................................................................................. 416
Table 157 ICMP Notes ....................................................................................................... 416
Table 158 Syslog Logs ....................................................................................................... 417
Table 159 RFC-2408 ISAKMP Payload Types ................................................................... 417
Table 160 IEEE 802.11g ..................................................................................................... 424
Table 161 Comparison of EAP Authentication Types ......................................................... 428
Table 162 Wireless Security Relational Matrix ................................................................... 429
Table 163 Abbreviations Used in the Example Internal SPTGEN Screens Table .............. 432
Table 164 Menu 1 General Setup (SMT Menu 1) .............................................................. 433
Table 165 Menu 3 (SMT Menu 3 ) ...................................................................................... 433
Table 166 Menu 4 Internet Access Setup (SMT Menu 4) .................................................. 436
Table 167 Menu 12 (SMT Menu 12) ................................................................................... 438