ZyXEL Communications ZyWALL 2 Series Network Card User Manual


 
ZyWALL 2 Series User’s Guide
Index Q-7
System Management Terminal ...................... 21-2
System Name ..........................................4-2, 22-1
System Status................................................. 32-1
System Timeout ............................................. 17-2
T
TCP Maximum Incomplete....11-21, 11-22, 11-24
TCP Security................................................ 10-10
TCP/IP .10-3, 10-4, 17-19, 23-9, 24-2, 24-3, 24-4,
26-7, 30-6, 30-7, 30-9, 30-12, 30-16
Setup.................................................................. 24-4
TCP/IP and DHCP Setup............................... 24-2
TCP/IP filter rule............................................ 30-6
Teardrop......................................................... 10-4
Telnet ........................................................... 17-19
Telnet Configuration.................................... 17-19
Terminal Emulation ....................................... 21-1
TFTP.............................................................. 33-5
File Upload ...................................................... 33-13
GUI-based Clients.............................................. 33-6
TFTP and FTP over WAN............................. 33-5
TFTP and FTP over WAN Will Not Work
When…...................................................... 33-5
TFTP and FTP Over WAN} .................17-2, 35-3
TFTP Restrictions ........................17-2, 33-5, 35-3
Three-Way Handshake................................... 10-5
Threshold Values ......................................... 11-21
Time and Date.................................................. 1-2
Time and Date Setting..................34-5, 34-6, 34-7
Time Zone...............................................4-7, 34-7
Timeout..................... 23-7, 23-8, 25-4, 25-5, 26-5
TLS ..................................................................F-1
Trace .............................................................. 32-5
Traceroute ...................................................... 10-7
Tracing............................................................. 1-6
Trademarks ......................................................... ii
Traffic Redirect..............................1-5, 6-14, 6-15
Setup................................................................ 26-11
Transport Layer Security .........................See TLS
Triangle........................................................... C-1
Triangle Route\ Solutions ............................... C-2
Trigger Port Forwarding.............................. 28-16
Process..............................................................28-17
Trivial File Transfer Protocol ................See TFTP
Troubleshooting...............................................A-1
Internet Access.....................................................A-3
LAN Interface......................................................A-2
WAN Interface.....................................................A-2
TTLS................................................................ F-1
Tunneled Transport Layer Service.........See TTLS
U
UDP/ICMP Security.................................... 10-10
Universal Plug and Play................................... 1-4
Universal Plug and Play (UPnP)........... 18-1, 18-3
UNIX Syslog ................................................. 32-6
Upload Firmware......................................... 33-11
UPnP................................................................ 1-4
UPnP Examples ............................................. 18-5
Upper Layer Protocols...................... 10-10, 10-11
Use Server Detected IP.................................. 22-4
User Name.............................................. 4-5, 22-3
User Profiles ........................................... 7-9, 16-1
User Specified IP Addr.................................. 22-4
V
VPN........................................................ 6-7, 25-3
VT100............................................................ 21-1
W
WAN DHCP..................................... 32-10, 32-11
WAN Setup....................................3-10, 6-2, 23-1
WAN to LAN Rules ...................................... 11-4
Warranty..............................................................v
Web Configurator 2-1, 2-3, 10-2, 10-11, 11-3, 29-
2
Web Site Hits........................................ 19-7, 19-8
WEP Encryption.............................................. 7-5
Wireless LAN..................................................D-1
Benefits................................................................D-1