Index
ZyWALL USG 300 User’s Guide
1111
backbone (BR) 394
backup designated (BDR) 394
designated (DR) 394
internal (IR) 393
link state advertisements
priority 394
types of 393
other documentation 3
OTP (One-Time Password) 750
outgoing bandwidth 317
oversize
chunk-encoding attack 640
len attack 641
offset attack 641
request-uri-directory attack 640
P
P1 33
P2P (Peer-to-peer) 600
attacks 600
see also Peer-to-peer
packet
flow 96
inspection signatures 593, 597
scan 574, 989
statistics 236
statistics graph 238
packet capture 886
example 889
files 888
troubleshooting 912
packet captures
downloading files 888
padding 608
Pairwise Master Key (PMK) 1029, 1031
PAP (Password Authentication Protocol) 356, 789
password 33
Password Authentication Protocol (PAP) 356, 789
payload
option 614
size 615
PCMCIA card installation 921
Peanut Hull 407
Peer-to-peer (P2P) 600
calls 161, 429
managing 547
Perfect Forward Secrecy (PFS) 476
Diffie-Hellman key group 503
performance
troubleshooting 900, 901, 902
Personal Identification Number code, see PIN
code
PFS (Perfect Forward Secrecy) 476, 503
phishing 654
physical ports 33
and interfaces 92
packet statistics 236
packet statistics graph 238
PIN code 316
PIN generator 750
pointer record 819
Point-to-Point Protocol over Ethernet, see
PPPoE.
Point-to-Point Tunneling Protocol, see PPTP
policy enforcement in IPSec 475
policy route
multiple WAN IP addresses 174
troubleshooting 897, 907
policy routes 98, 374
actions 376
and address objects 380
and ALG 429, 430, 433
and HTTP redirect 424
and interfaces 381
and NAT 374
and schedules 380, 561, 564, 567, 570
and services 738
and trunks 364, 381
and user groups 379, 380, 561, 564, 567, 570
and users 379, 380, 561, 564, 567, 570
and VoIP pass through 429, 430
and VPN connections 381, 904
bandwidth management 383
benefits 374
BWM 377
configuration overview 101
criteria 376
L2TP VPN 544
overriding direct routes 377
prerequisites 102
polymorphic virus 587
POP