ZyXEL Communications ZyXEL ZyWALL 35 User Manual

Page 44

Advertising
background image

ZyWALL 35 User’s Guide

42

Table 209 Menu 27.1.1.1: IKE Setup ................................................................................. 568
Table 210 Active Protocol: Encapsulation and Security Protocol ....................................... 569
Table 211 Menu 27.1.1.2: Manual Setup ............................................................................ 570
Table 212 Menu 27.2: SA Monitor ...................................................................................... 574
Table 213 Troubleshooting the Start-Up of Your ZyWALL .................................................. 577
Table 214 Troubleshooting the LAN Interface .................................................................... 577
Table 215 Troubleshooting the DMZ Interface ................................................................... 578
Table 216 Troubleshooting the WAN Interface ................................................................... 578
Table 217 Troubleshooting Internet Access ....................................................................... 579
Table 218 Troubleshooting the Password .......................................................................... 579
Table 219 Troubleshooting Telnet ...................................................................................... 579
Table 220 General Specifications ....................................................................................... 581
Table 221 Console/Dial Backup Port Pin Assignments ...................................................... 582
Table 222 North American AC Power Adaptor Specifications ............................................ 582
Table 223 European Union AC Power Adaptor Specifications ........................................... 583
Table 224 UK AC Power Adaptor Specifications ................................................................ 583
Table 225 Japan AC Power Adaptor Specifications ........................................................... 584
Table 226 Australia and New Zealand AC Power Adaptor Specification ........................... 584
Table 227 Classes of IP Addresses ................................................................................... 597
Table 228 Allowed IP Address Range By Class ................................................................. 598
Table 229 “Natural” Masks ................................................................................................ 598
Table 230 Alternative Subnet Mask Notation ..................................................................... 599
Table 231 Two Subnets Example ....................................................................................... 599
Table 232 Subnet 1 ............................................................................................................ 600
Table 233 Subnet 2 ............................................................................................................ 600
Table 234 Subnet 1 ............................................................................................................ 601
Table 235 Subnet 2 ............................................................................................................ 601
Table 236 Subnet 3 ............................................................................................................ 601
Table 237 Subnet 4 ............................................................................................................ 601
Table 238 Eight Subnets .................................................................................................... 602
Table 239 Class C Subnet Planning ................................................................................... 602
Table 240 Class B Subnet Planning ................................................................................... 603
Table 241 Comparison of EAP Authentication Types ......................................................... 618
Table 242 SIP Call Progression ......................................................................................... 623
Table 243 Firewall Commands ........................................................................................... 655
Table 244 NetBIOS Filter Default Settings ......................................................................... 662
Table 245 Certificates Commands ..................................................................................... 665
Table 246 Brute-Force Password Guessing Protection Commands .................................. 669
Table 247 System Maintenance Logs ................................................................................ 673
Table 248 System Error Logs ............................................................................................. 674
Table 249 Access Control Logs .......................................................................................... 674
Table 250 TCP Reset Logs ................................................................................................ 675
Table 251 Packet Filter Logs .............................................................................................. 675

Advertising