Prestige 645R-A Series User’s Guide
Index H-3
Logic Flow............................................... 17-10
IP mask ..........................................................17-9
IP Packet ...................................................... 17-12
IP Policies ...................................................... 21-5
IP Policy Routing (IPPR)........................1-2, 12-1
Applying an IP Policy................................ 21-5
Ethernet IP Policies....................................21-5
Gateway.....................................................21-5
IP Protocol .....................................................21-4
IP Routing Policy (IPPR)............................... 21-1
Benefits...................................................... 21-1
Cost Savings ..............................................21-1
Criteria.......................................................21-1
Load Sharing..............................................21-1
Setup..........................................................21-2
IP Routing Policy Setup................................. 21-3
IP Static Route ............................................... 14-1
IP Static Route Setup ..................................... 14-2
L
LAN......................................................19-2, 19-3
LAN Setup.......................................................5-1
LAN TCP/IP .................................................... 5-2
LED Indicators.................................................2-1
Link type........................................................19-2
LLC-based Multiplexing..............................13-13
Log and Trace................................................ 19-6
Log Facility.................................................... 19-7
Logging Option.................................17-10, 17-13
Login.............................................................. 13-4
M
MAC address .................................................15-4
Main Menu.......................................................9-3
Management Information Base (MIB)...........18-2
Media Access Control....................................15-1
Message Logging...........................................19-5
Metric...........................................13-5, 13-8, 14-3
Multicast .................................................5-3, 13-8
Multiplexing
LLC-based................................................... 4-2
VC-based..................................................... 4-2
Multiplexing ...........................1-2, 4-2, 12-6, 13-2
Multiprotocol Encapsulation............................ 4-2
My WAN Address......................................... 13-7
N
Nailed-Up Connection..................................... 4-6
NAT........................................4-5, 6-5, 6-7, 17-14
Application.................................................. 6-3
Applying NAT in the SMT Menus............ 16-1
Configuring ............................................... 16-3
Definitions................................................... 6-1
Examples................................................. 16-11
How NAT Works ........................................ 6-2
Mapping Types............................................ 6-3
Non NAT Friendly Application Programs16-17
Ordering Rules .......................................... 16-6
Server Sets................................................... 6-5
What NAT does........................................... 6-1
Network Address Translation (NAT) .....1-2, 16-1
Network Management ..................................... 6-6
NNTP............................................................... 6-6
P
Packet
Error .......................................................... 19-2
Received.................................................... 19-3
Transmitted................................................ 19-2
Packet triggered............................................. 19-7
Packets........................................................... 19-2
PAP................................................................ 13-4
Password......................... 3-3, 9-1, 9-5, 13-4, 18-2
Ping................................................................ 19-9
Point-to-Point....................................................xxi
Point-to-Point Tunneling Protocol................... 6-6
policy-based routing ...................................... 21-1
POP3................................................................ 6-6
Port Numbers................................................... 6-6
Power Adapter................................................. 2-4
PPP Encapsulation....................................... 13-13
PPP log .................................................19-7, 19-8