ZyXEL Communications 650 Series Network Card User Manual


 
Prestige 650 Series User’s Guide
J-4 Index
IP Protocol.............................................................. 39-4
IP Routing Policy (IPPR)........................................39-1
Benefits...................................................... 39-1
Cost Savings.............................................. 39-1
Criteria....................................................... 39-1
Load Sharing ............................................. 39-1
Setup.......................................................... 39-2
IP Routing Policy Setup..........................................39-3
IP Spoofing....................................................10-4, 10-7
IP Static Route........................................................28-1
IP Static Route Setup..............................................28-2
IPSec standard ..........................................................1-4
IPSec VPN Capability ..............................................1-4
ISDN........................................................................ G-2
K
Key Fields For Configuring Rules..........................12-2
L
LAN........................................................................ 35-3
LAN Setup.........................................................4-1, 6-1
LAN TCP/IP.............................................................4-2
LAN to WAN Rules............................................... 12-3
LAND............................................................10-4, 10-6
Link type.................................................................35-2
LLC-based Multiplexing.......................................27-13
Local Network
Rule Summary........................................... 12-7
Log and Trace.........................................................35-5
Log Descriptions...................................................... H-1
Log Facility ............................................................35-7
Logging Option..........................................31-12, 31-15
Login ......................................................................27-4
Logs........................................................................ 19-1
M
MAC address..........................................................29-4
MAC Address Filter ...............................................25-3
MAC Address Filter Action.............................5-9, 25-4
MAC Address Filtering ............................................5-7
Main Menu .............................................................22-4
Management Information Base (MIB)....................33-2
Maximize Bandwidth Usage........................20-4, 20-11
Max-incomplete High.............................................11-4
Max-incomplete Low ............................................. 11-4
MBS ...................................... See Maximum Burst Size
Media Access Control ............................................ 29-1
Message Logging ................................................... 35-5
Metric...................................................27-5, 27-8, 28-3
Multicast..........................................................4-3, 27-8
Multiplexing
LLC-based....................................................3-2
VC-based......................................................3-2
Multiplexing...................................1-6, 3-2, 26-6, 27-2
Multiprotocol Encapsulation .................................... 3-2
My WAN Address.................................................. 27-7
N
Nailed-Up Connection.............................................. 3-6
NAT.................................................3-4, 7-5, 7-7, 31-16
Application...................................................7-2
Applying NAT in the SMT Menus.............30-1
Configuring................................................30-3
Definitions....................................................7-1
Examples..................................................30-11
How NAT Works.........................................7-2
Mapping Types ............................................7-3
Non NAT Friendly Application Programs30-17
Ordering Rules...........................................30-6
Server Sets....................................................7-5
What NAT does............................................7-1
NAT Traversal........................................................ 18-1
NetBIOS commands............................................... 10-7
Network Address Translation................................. 26-7
Network Address Translation (NAT)..................... 30-1
Network Management.......................................1-6, 7-6
NNTP ....................................................................... 7-6
O
One-Minute High ................................................... 11-4
P
Packet
Error...........................................................35-2
Received.....................................................35-3
Transmitted ................................................35-3
Packet Filtering..................................................... 10-12