
ZyWALL 5/35/70 Series User’s Guide
List of Tables 51
Table 254 Menu 25: Sample IP Routing Policy Summary .................................................. 691
Table 255 IP Routing Policy Setup ..................................................................................... 692
Table 256 Menu 25.1: IP Routing Policy Setup .................................................................. 693
Table 257 Menu 25.1.1: IP Routing Policy Setup ............................................................... 695
Table 258 Schedule Set Setup ........................................................................................... 700
Table 259 Troubleshooting the Start-Up of Your ZyWALL .................................................. 703
Table 260 Troubleshooting the LAN Interface .................................................................... 703
Table 261 Troubleshooting the DMZ Interface ................................................................... 704
Table 262 Troubleshooting the WAN Interface ................................................................... 704
Table 263 Troubleshooting Accessing the ZyWALL ........................................................... 705
Table 264 Device Specifications ......................................................................................... 715
Table 265 Performance ...................................................................................................... 716
Table 266 Firmware Features ............................................................................................ 716
Table 267 Feature Specifications ....................................................................................... 718
Table 268 Compatible ZyXEL WLAN Cards and Security Features .................................. 719
Table 269 Console/Dial Backup Port Pin Assignments ...................................................... 721
Table 270 Classes of IP Addresses ................................................................................... 746
Table 271 Allowed IP Address Range By Class ................................................................. 746
Table 272 “Natural” Masks ................................................................................................ 747
Table 273 Alternative Subnet Mask Notation ..................................................................... 747
Table 274 Two Subnets Example ....................................................................................... 748
Table 275 Subnet 1 ............................................................................................................748
Table 276 Subnet 2 ............................................................................................................749
Table 277 Subnet 1 ............................................................................................................749
Table 278 Subnet 2 ............................................................................................................750
Table 279 Subnet 3 ............................................................................................................750
Table 280 Subnet 4 ............................................................................................................750
Table 281 Eight Subnets .................................................................................................... 751
Table 282 Class C Subnet Planning ................................................................................... 751
Table 283 Class B Subnet Planning ................................................................................... 752
Table 284 Commonly Used Services ................................................................................. 753
Table 285 IEEE802.11g ...................................................................................................... 761
Table 286 Comparison of EAP Authentication Types ......................................................... 767
Table 287 Wireless Security Relational Matrix ................................................................... 768
Table 288 Firewall Commands ........................................................................................... 807
Table 289 NetBIOS Filter Default Settings ......................................................................... 814
Table 290 Certificates Commands ..................................................................................... 817
Table 291 Brute-Force Password Guessing Protection Commands .................................. 821
Comentários a estes Manuais