P-660HW-T v2 User’s Guide
30
List of Tables
Table 125 Menu 21.1 Filter Set #1
.....................................................................................
273
Table 126 Menu 21.1 Filer Set #2,
.....................................................................................
275
Table 127 Menu 23 System Menus
....................................................................................
276
Table 128 Menu 24.11 Remote Management Control
........................................................
277
Table 129 Command Examples
.........................................................................................
278
Table 130 Classes of IP Addresses
...................................................................................
297
Table 131 Allowed IP Address Range By Class
.................................................................
298
Table 132 “Natural” Masks
.................................................................................................
298
Table 133 Alternative Subnet Mask Notation
.....................................................................
299
Table 134 Two Subnets Example
.......................................................................................
300
Table 135 Subnet 1
............................................................................................................
300
Table 136 Subnet 2
............................................................................................................
300
Table 137 Subnet 1
............................................................................................................
301
Table 138 Subnet 2
............................................................................................................
301
Table 139 Subnet 3
............................................................................................................
302
Table 140 Subnet 4
............................................................................................................
302
Table 141 Eight Subnets
....................................................................................................
302
Table 142 Class C Subnet Planning
...................................................................................
303
Table 143 Class B Subnet Planning
...................................................................................
303
Table 144 Firewall Commands
...........................................................................................
309
Table 145 NetBIOS Filter Default Settings
.........................................................................
316
Table 146 IEEE 802.11g
.....................................................................................................
325
Table 147 Wireless Security Levels
...................................................................................
326
Table 148 Comparison of EAP Authentication Types
.........................................................
329
Table 149 Wireless Security Relational Matrix
...................................................................
333