ZyXEL Communications 202H Network Card User Manual


 
Prestige 202H User’s Guide
H Index
Customer Support............................................... vi
D
data compression..............................................1-4
Data Filtering...................................................18-1
Data Link Connection........................................5-3
DDNS
Configuration .......................................................4-3
Default Dial-In Setup ..................................10-1
Default Policy Log ...........................................15-5
Denial of Service................. 12-2, 12-3, 13-1, 14-8
Denial of Services
Thresholds........................................................14-10
Destination Address .............................15-3, 15-11
Device Filter rules .........................................18-16
DHCP........................................4-2, 6-2, 6-4, 20-5
DHCP (Dynamic Host Configuration Protocol)..1-4
DHCP Setup......................................................6-5
Diagnostic .....................................................20-12
Diagnostic Tools..............................................20-1
dial-in user.......................................................10-1
Dial-in User .....................................................10-4
Dial-On-Demand ...............................................1-3
Disclaimer ............................................................ii
DNS.............................See Domain Name System
Domain Name ...............................................11-13
Domain Name System ......................................6-4
DoS
Basics.................................................................12-3
Types..................................................................12-4
DoS (Denial of Service).....................................1-1
DSS-1................................................................5-2
Dynamic DNS....................................................4-2
DYNDNS Wildcard............................................4-2
E
e.g. ..................................See Syntax Conventions
E-mail
Log Example......................................................14-6
Mail Server.........................................................14-5
Mail Subject.......................................................14-5
Tab .....................................................................14-4
EMAIL ...............................................................4-3
E-mail Address..................................................4-3
E-mail Alerts....................................................14-5
Enable Wildcard................................................4-3
Encapsulation ...................................................8-8
Enter ...............................See Syntax Conventions
Entering Information..........................................3-2
Error Log.........................................................20-5
Error/Information Messages
Sample ............................................................... 20-6
Ethernet ............................................................6-1
Ethernet Encapsulation.................................11-12
Ethernet Traffic .............................................18-20
European (DSS1) ISDN Setup Menus..............5-2
F
Factory Ethernet Defaults .................................6-2
FCC .....................................................................iii
Features............................................................1-1
Filename Conventions ....................................21-1
Filter
Applying Filters ........................................... 18-19
Default Dial-in Filter.......................................... 10-4
Ethernet Setup...................................................... 6-1
Ethernet traffic................................................. 18-20
Ethernet Traffic............................................ 18-20
Filter Rules.......................................................18-7
Filter Structure ................................................... 18-4
Generic Filter Rule ...................................... 18-14
Remote Node Filter............................................ 8-14
Remote Node Filters.................................... 18-20
Sample ............................................................. 18-18
SUA ................................................................. 18-16
TCP/IP Filter Rule..........................................18-9
Filter Log.........................................................20-7
Filter Rule Process..........................................18-3
Filter Rule Setup .............................................18-9
Filter Rules Summary
Sample ............................................................. 18-19
Filter Set
Class................................................................... 18-9
Filtering..................................................18-1, 18-9
Filtering Process
Outgoing Packets ............................................... 18-2
Firewall .............................................................1-1
Access Methods ................................................. 13-1