Operation Manual
List of Tables
NBG318S User’s Guide
27
Table 82 TCP Reset Logs .................................................................................................................... 206
Table 83 Packet Filter Logs ................................................................................................................. 207
Table 84 ICMP Logs ............................................................................................................................ 207
Table 85 CDR Logs ............................................................................................................................. 208
Table 86 PPP Logs .............................................................................................................................. 208
Table 87 UPnP Logs ............................................................................................................................ 208
Table 88 Content Filtering Logs ........................................................................................................... 208
Table 89 Attack Logs ........................................................................................................................... 209
Table 90 PKI Logs ............................................................................................................................... 210
Table 91 802.1X Logs ...........................................................................................................................211
Table 92 ACL Setting Notes ................................................................................................................ 212
Table 93 ICMP Notes ........................................................................................................................... 212
Table 94 Syslog Logs .......................................................................................................................... 213
Table 95 RFC-2408 ISAKMP Payload Types ...................................................................................... 213
Table 96 Maintenance > Tools > Firmware .......................................................................................... 215
Table 97 Maintenance Restore Configuration ..................................................................................... 217
Table 98 Maintenance > Config Mode > General ............................................................................... 221
Table 99 Advanced Configuration Options ......................................................................................... 222
Table 100 Maintenance > Sys OP Mode > General ........................................................................... 224
Table 101 Hardware Features ............................................................................................................. 239
Table 102 Firmware Features .............................................................................................................. 240
Table 103 Standards Supported .......................................................................................................... 242
Table 104 Subnet Mask - Identifying Network Number ....................................................................... 252
Table 105 Subnet Masks ..................................................................................................................... 253
Table 106 Maximum Host Numbers .................................................................................................... 253
Table 107 Alternative Subnet Mask Notation ....................................................................................... 253
Table 108 Subnet 1 .............................................................................................................................. 255
Table 109 Subnet 2 .............................................................................................................................. 256
Table 110 Subnet 3 .............................................................................................................................. 256
Table 111 Subnet 4 .............................................................................................................................. 256
Table 112 Eight Subnets ...................................................................................................................... 256
Table 113 24-bit Network Number Subnet Planning ............................................................................ 257
Table 114 16-bit Network Number Subnet Planning ............................................................................ 257
Table 115 IEEE 802.11g ...................................................................................................................... 279
Table 116 Comparison of EAP Authentication Types .......................................................................... 282
Table 117 Wireless Security Relational Matrix ..................................................................................... 285
Table 118 Examples of Services .......................................................................................................... 287










