Internet Security Appliance User's Guide

List of Tables
ZyWALL 5/35/70 Series User’s Guide
45
Table 168 REPORTS > Anti-Spam ...................................................................................................... 549
Table 169 REPORTS > E-mail Report ................................................................................................. 552
Table 170 LOGS > View Log ............................................................................................................... 556
Table 171 Log Description Example .................................................................................................... 557
Table 172 LOGS > Log Settings .......................................................................................................... 559
Table 173 System Maintenance Logs .................................................................................................. 561
Table 174 System Error Logs .............................................................................................................. 563
Table 175 Access Control Logs ........................................................................................................... 563
Table 176 TCP Reset Logs .................................................................................................................. 564
Table 177 Packet Filter Logs ............................................................................................................... 565
Table 178 ICMP Logs .......................................................................................................................... 565
Table 179 CDR Logs ........................................................................................................................... 566
Table 180 PPP Logs ............................................................................................................................ 566
Table 181 3G Logs .............................................................................................................................. 566
Table 182 UPnP Logs .......................................................................................................................... 567
Table 183 Content Filtering Logs ......................................................................................................... 568
Table 184 Attack Logs ......................................................................................................................... 568
Table 185 Remote Management Logs ................................................................................................. 570
Table 186 Wireless Logs ..................................................................................................................... 570
Table 187 IPSec Logs .......................................................................................................................... 571
Table 188 IKE Logs ............................................................................................................................. 571
Table 189 PKI Logs ............................................................................................................................. 574
Table 190 802.1X Logs ........................................................................................................................ 576
Table 191 ACL Setting Notes .............................................................................................................. 577
Table 192 ICMP Notes ......................................................................................................................... 578
Table 193 IDP Logs ............................................................................................................................. 579
Table 194 AV Logs ............................................................................................................................... 579
Table 195 AS Logs .............................................................................................................................. 581
Table 196 Syslog Logs ........................................................................................................................ 583
Table 197 RFC-2408 ISAKMP Payload Types .................................................................................... 584
Table 198 MAINTENANCE > General Setup ....................................................................................... 586
Table 199 MAINTENANCE > Password ..............................................................................................587
Table 200 MAINTENANCE > Time and Date ...................................................................................... 588
Table 201 MAC-address-to-port Mapping Table .................................................................................. 591
Table 202 MAINTENANCE > Device Mode (Router Mode) ................................................................. 593
Table 203 MAINTENANCE > Device Mode (Bridge Mode) ................................................................. 594
Table 204 MAINTENANCE > Firmware Upload .................................................................................. 595
Table 205 Restore Configuration ......................................................................................................... 597
Table 206 MAINTENANCE > Diagnostics ...........................................................................................600
Table 207 Main Menu Commands ....................................................................................................... 606
Table 208 Main Menu Summary .......................................................................................................... 608
Table 209 SMT Menus Overview ......................................................................................................... 609
Table 210 Menu 1: General Setup (Router Mode) ............................................................................... 613