List of Tables
NBG334W User’s Guide
25
Table 82 Content Filtering Logs
...........................................................................................................
184
Table 83 Attack Logs
...........................................................................................................................
185
Table 84 PKI Logs
...............................................................................................................................
186
Table 85 802.1X Logs
..........................................................................................................................
187
Table 86 ACL Setting Notes
................................................................................................................
188
Table 87 ICMP Notes
...........................................................................................................................
188
Table 88 Syslog Logs
..........................................................................................................................
189
Table 89 RFC-2408 ISAKMP Payload Types
......................................................................................
189
Table 90 Maintenance > Tools > Firmware
..........................................................................................
191
Table 91 Maintenance Restore Configuration
.....................................................................................
193
Table 92 Maintenance > Config Mode > General
...............................................................................
197
Table 93 Advanced Configuration Options
.........................................................................................
198
Table 94 Maintenance > Sys OP Mode > General
.............................................................................
201
Table 95 Hardware Features
................................................................................................................
211
Table 96 Firmware Features
.................................................................................................................
211
Table 97 Feature Specifications
...........................................................................................................
213
Table 98 Standards Supported
............................................................................................................
213
Table 99 Subnet Mask - Identifying Network Number
.........................................................................
224
Table 100 Subnet Masks
.....................................................................................................................
225
Table 101 Maximum Host Numbers
....................................................................................................
225
Table 102 Alternative Subnet Mask Notation
.......................................................................................
225
Table 103 Subnet 1
..............................................................................................................................
227
Table 104 Subnet 2
..............................................................................................................................
228
Table 105 Subnet 3
..............................................................................................................................
228
Table 106 Subnet 4
..............................................................................................................................
228
Table 107 Eight Subnets
......................................................................................................................
228
Table 108 24-bit Network Number Subnet Planning
............................................................................
229
Table 109 16-bit Network Number Subnet Planning
............................................................................
229
Table 110 IEEE 802.11g
......................................................................................................................
251
Table 111 Comparison of EAP Authentication Types
...........................................................................
254
Table 112 Wireless Security Relational Matrix
.....................................................................................
257
Table 113 Examples of Services
..........................................................................................................
259