ZyXEL Communications 200 Series User Manual

Page 50

Advertising
background image

List of Tables

ZyWALL USG 100/200 Series User’s Guide

50

Table 297 Device HA Logs .................................................................................................................. 797

Table 298 Routing Protocol Logs ......................................................................................................... 799

Table 299 NAT Logs ............................................................................................................................ 802

Table 300 PKI Logs ............................................................................................................................. 803

Table 301 Interface Logs ..................................................................................................................... 805

Table 302 WLAN Logs ......................................................................................................................... 809

Table 303 Account Logs .......................................................................................................................811

Table 304 Port Grouping Logs ..............................................................................................................811

Table 305 Force Authentication Logs ...................................................................................................811

Table 306 File Manager Logs .............................................................................................................. 812

Table 307 E-mail Daily Report Logs .................................................................................................... 812

Table 308 Commonly Used Services ................................................................................................... 815

Table 309 IEEE 802.11g ...................................................................................................................... 835

Table 310 Wireless Security Levels ..................................................................................................... 836

Table 311 Comparison of EAP Authentication Types .......................................................................... 839

Table 312 Wireless Security Relational Matrix .................................................................................... 842

Advertising
This manual is related to the following products: