ZyXEL Communications Wireless Gateway Series Network Router User Manual


 
ZyAIR Wireless Gateway Series User’s Guide
Index Q-5
Remote Node Profile.................................21-2
Reports..........................................................15-6
Consideration............................................15-7
Required fields..............................................17-5
Restore ........................................................16-12
Restore Configuration...................................28-7
RF signals.......................................................D-1
RIP ............................................... 5-2, 19-3, 21-6
Roaming
Enable on ZyAIR....................................19-11
Example ......................................................6-8
Requirements ..............................................6-9
RTS Threshold...................................... 6-3, 19-7
Rules ................................................... 12-1, 12-5
Checklist ...................................................12-2
Creating Custom .......................................12-1
Key Fields.................................................12-3
LAN to WAN............................................12-4
Logic .........................................................12-2
Predefined Services.................................12-13
S
Schedule Sets
Duration ....................................................31-2
Security Parameters.......................................7-11
Security Ramifications..................................12-2
Server.4-8, 9-5, 23-2, 23-4, 23-6, 23-7, 23-8, 23-
9, 23-11, 23-12
Service .....................................................iv, 12-3
Service Set ......................................................6-7
Service Type ..................................................A-2
Services...........................................................9-6
setup a schedule ............................................31-2
SMT Menu Overview ...................................17-3
SMTP..............................................................9-6
Smurf .................................................. 11-5, 11-6
SNMP........................................... 9-7, 12-3, 13-6
Configuration ............................................25-1
Get.............................................................13-7
Manager ....................................................13-7
MIBs .........................................................13-8
Trap...........................................................13-8
Trusted Host..............................................25-1
Stateful Inspection.....1-4, 11-1, 11-2, 11-7, 11-8,
24-17
Static Route...................................................10-1
Static Route Setup.........................................21-7
Static Routing Topology ...............................21-7
SUA..................................................9-6, 9-7, 9-8
SUA (Single User Account).................. See NAT
Subnet Mask..... 3-12, 5-5, 19-3, 21-5, 21-9, 27-4
Subnet Masks.................................................. J-2
Subnetting ....................................................... J-3
Supporting Disk ............................................xxvi
SYN Flood .......................................... 11-4, 11-5
SYN-ACK.....................................................11-5
Syslog............................................................27-6
Syslog IP Address .........................................27-7
Syslog Server ................................................27-6
System
Console Port Speed ...................................27-4
Diagnostic .................................................27-8
Log and Trace ...........................................27-5
Syslog and Accounting..............................27-6
System Information...................................27-3
System Status ............................................27-1
Time and Date...........................................29-4
System Information.......................................27-3
System Information & Diagnosis..................27-1
System Maintenance ..27-1, 27-3, 28-2, 28-5, 28-
13, 28-14, 29-1, 29-2, 29-3, 29-5
System Name ..................................................4-2
System Timeout .................................. 13-2, 30-4
T
TCP/IP... 5-5, 11-3, 11-4, 13-2, 24-12, 27-8, 30-1
Teardrop........................................................11-4
Telnet .................................................. 13-2, 30-1
Telnet Configuration........................... 13-2, 30-1
Telnet Under NAT ........................................30-1
Temporal Key Integrity Protocol ....................7-9
TFTP