ZyXEL Communications 650 Series Network Card User Manual


 
Prestige 650 Series User’s Guide
Index J-5
Packet Filtering Firewalls....................................... 10-1
Packet Triggered .................................................... 35-7
Packets.................................................................... 35-2
PAP ........................................................................ 27-4
Password ..............................2-3, 22-1, 22-6, 27-4, 33-2
Ping ........................................................................ 35-9
Ping of Death.......................................................... 10-4
Point-to-Point....................................................... xxviii
Point-to-Point Tunneling Protocol...........7-6. See PPTP
policy-based routing............................................... 39-1
POP3 ......................................................7-6, 10-3, 10-4
Port Configuration.................................................. 13-3
Port Numbers............................................................ 7-6
PPP Encapsulation................................................ 27-13
PPP Log......................................................... 35-7, 35-8
PPPoA .................................................................... 27-2
PPTP......................................................................... 7-6
Precedence..................................................... 39-1, 39-4
Prestige Firewall Application................................. 10-3
Priority.................................................................. 20-14
Priority-based Scheduler ........................................ 20-4
Private ...........................................................27-8, 28-4
Proportional Bandwidth Allocation........................ 20-2
Protocol................................................................ 31-10
Protocol Filter Rules............................................. 31-16
Q
Quality of Service................................................... 39-1
Quick Start Guide..................................................... 2-1
R
RADIUS................................................................... 1-3
RAS............................................................... 35-4, 39-2
Rate
Receiving...................................................35-2
Transmission.............................................. 35-2
Read Me First..........................................................xxvi
Related Documentation...........................................xxvi
Remote Authentication Dial In User Service............See
RADIUS
Remote DHCP Server ............................................ 24-3
Remote Management
Firewall.............................................11-1, 32-1
Remote Management and NAT.............................. 17-2
Remote Management Limitations.................. 17-1, 38-2
Remote Management Setup.....................................38-1
Remote Node................................................. 27-1, 35-2
Profile (Traffic Redirect Field)................ 27-16
Remote Node Profile................................. 27-3
Remote Node Setup.......................... 27-1, 27-2
Remote Node Index Number...................................35-2
Remote Node Traffic.............................................31-21
Required fields........................................................22-4
Restore ..................................................................21-15
Restore Configuration.............................................36-7
RF signals.................................................................C-1
RFC-1483................................................................27-2
RFC-2364...................................................... 27-2, 27-3
RIP .........24-3, 27-8. See Routing Information Protocol
Root Class.............................................................20-11
Routing Information Protocol ...................................4-3
Direction...................................................... 4-3
Version ........................................................ 4-3
Routing Policy.........................................................39-1
RTS Threshold................................................ 5-2, 25-2
Rule Summary............................................... 12-6, 13-6
Rules ............................................................. 12-1, 12-4
Checklist.................................................... 12-1
Creating Custom........................................ 12-1
Key Fields ................................................. 12-2
LAN to WAN............................................ 12-3
Logic.......................................................... 12-1
Predefined Services................................... 12-8
Source and Destination Addresses .......... 12-13
Summary ................................................... 12-6
Timeout ................................................... 12-14
S
SA Monitor .............................................................42-1
Sample IP Addresses...............................................27-8
Saving the State.......................................................10-7
Schedule Sets
Duration..................................................... 40-2
Scheduler..................................................... 20-4, 20-11
SCR..............................................See Sustain Cell Rate
Security Association................................................42-1
Security In General ...............................................10-11
Security Ramifications............................................12-2