ZyXEL Communications 652 Network Router User Manual


 
Prestige 652 ADSL Security Router
Index KK
T
TCP Maximum Incomplete........11-7, 11-8, 11-10
TCP Security.................................................. 9-10
TCP/IP .................6-1, 9-3, 9-4, 16-16, 18-9, 21-1
TCP/IP Options................................................ 6-1
TCP/IP Parameters...........................................4-2
Teardrop...........................................................9-4
Telephone Microfilters..................................... 2-5
Telnet .............................................................21-1
Telnet Configuration...................................... 21-1
Telnet Under NAT......................................... 21-1
Text File Format ............................................ 28-1
TFTP and FTP Over WAN} .................19-4, 21-3
TFTP File Transfer.......................................19-12
TFTP Restrictions.................................19-4, 21-3
Three-Way Handshake..................................... 9-5
Threshold Values ...........................................11-6
Time and Date Setting...........................20-4, 20-5
Time Zone......................................................20-5
Timeout.............................................12-13, 12-14
To avoid damage to the Prestige......................2-3
TOS (Type of Service)................................... 22-1
Trace Records ................................................ 18-5
Traceroute ........................................................9-7
Transfer Rate.................................................. 18-3
Transmission Rates................................. xxiv, 1-1
Type of Service.................. 22-1, 22-3, 22-4, 22-5
U
UDP/ICMP Security...................................... 9-10
UNIX Syslog ........................................ 18-5, 18-7
UNIX syslog parameters................................ 18-6
Upload Firmware......................................... 19-10
Upper Layer Protocols.......................... 9-10, 9-11
V
VC-based Multiplexing ............................ 5-2, 6-1
Virtual Private Network................................... 1-1
VPI & VCI..................................................... 4-11
W
WAN to LAN Rules ...................................... 12-4
Web................................................................ 21-2
Web Configurator....... 9-2, 9-11, 10-2, 11-1, 12-2
Login ......................................................... 11-1
Password.................................................... 11-1
X
XMODEM protocol....................................... 19-2
XMODEM upload........................................... 2-8
Z
ZyNOS.................................................. 19-1, 19-2
ZyNOS F/W Version..................................... 19-1
ZyXEL Limited Warranty
Note.................................................................v
ZyXEL’s Firewall
Introduction................................................. 9-2