ZyXEL Communications 50 Network Card User Manual


 
ZyWALL 50 Internet Security Gateway
Index U
Index
A
Action for Matched Packets ..........................10-11
Activate The Firewall.......................................13-3
Alert Schedule...................................................9-5
Application-level Firewalls.................................7-1
Applications for the ZyWALL 10........................1-4
AT command...................................................18-2
Attack
Reasons......................................................12-2
Attack Alert.................................................9-7, 9-9
Attack Types.....................................................7-6
Reason .........................................................8-3
Authentication ............................................4-4, 4-5
auto-negotiation................................................1-1
B
backup ............................................................18-2
Blocking Time ...................................9-8, 9-9, 9-11
Boot Commands..................................................K
Broadband Access Security Gateway....i, xxxi, 1-1
Brute-force Attack, ............................................7-6
Budget Management..............................19-2, 19-3
C
Cable Modem......................................2-3, 2-4, 7-2
Call Control.....................................................19-2
Call History......................................................19-4
Call Scheduling...............................................21-1
maximum number of schedule sets ............21-1
PPPoE ........................................................21-3
precedence.................................................21-1
precedence example................See precedence
Call-Trigerring Packet ...................................17-10
CDR................................................................17-7
certification........................................................... v
CHAP................................................................4-5
CLI Commands................................................... M
Command Interpreter Mode............................ 19-1
Conditions that prevent TFTP and FTP from
working over WAN......................................18-4
Configuring A POP Custom Port .................... 13-8
Console Port..................... 2-3, 17-3, 17-4, 17-5, H
Content Filtering .............................................14-1
Categories ..................................................14-1
Customizing................................................ 14-2
Days and Times.......................................... 14-1
Exempt Computers.....................................14-1
Filter List..................................................... 14-1
Keywords.................................................... 14-2
Log Records ...............................................14-2
Restrict Web Features................................ 14-1
Update List ................................................. 14-1
Copyright ..............................................................ii
Custom Ports
Creating/Editing.......................................... 11-3
Introduction................................................. 11-1
Customer Support ..............................................vii
Customized Services......................................11-2
D
Default Policy Log........................................... 10-6
Denial of Service .........................7-2, 7-3, 8-1, 9-8
Denial of Services
Thresholds.................................................. 9-10
DestAdd........................................................ 13-11
Destination Address.............................10-3, 10-10
DHCP (Dynamic Host Configuration Protocol) 1-3,
5-2
DHCP Ethernet Setup.......................................5-5
DHCP Negotaition and Syslog Connection from
the Internet – EG 3 ................................... 13-12
DHCP Negotiation ........................................ 13-12
Diagnostic..................................................... 17-11
DNS.................................................................. 5-2
Domain Name.................................5-2, 6-13, 17-3
DoS
Basics........................................................... 7-3