ZyXEL Communications ZyAIR User Manual page 398

Wireless gateway series
Hide thumbs Also See for ZyAIR:
Table of Contents

Advertisement

ZyAIR Wireless Gateway Series User's Guide
Distribution System ....................................... D-3
DMZ Setup ..................................................... 8-1
DNS ...................................................13-10, 19-3
Domain Name....................... 3-3, 3-12, 9-6, 23-8
DoS
Basics........................................................ 11-3
Types ........................................................ 11-4
DoS (Denial of Service).......................1-4, 24-17
DS .................................. See Distribution System
DSSS........See Direct Sequence Spread Spectrum
Dynamic DNS................ 1-4, 4-2, 4-3, 18-1, 18-3
DYNDNS Wildcard...............................4-3, 18-1
EAP................................................................. 1-4
EAP Authentication ........................................F-1
MD5............................................................F-1
TLS .............................................................F-1
TTLS...........................................................F-1
ECHO ............................................................. 9-6
Enable Wildcard ........................................... 18-4
Encapsulation..............................20-1, 20-2, 21-1
PPP over Ethernet ...................................... H-1
Error Log ...................................................... 27-5
Error/Information Messages
Sample ...................................................... 27-5
ESS ...... See Extended Service Set. See Extended
Service Set
ESS ID ............................................................ 3-1
Ethernet....................................................3-5, 3-9
Ethernet Encapsulation ................................. 23-7
Ethernet Traffic........................................... 24-16
Extended Service Set ..............................D-3, 6-2
Extended Service Set IDentification............... 6-7
Factory LAN Defaults .................................... 5-2
FCC................................................................... iii
FHSS..See Frequency-Hopping Spread Spectrum
Filename Conventions .................................. 28-1
Q-2
E
F
Filter..............................................................19-1
Applying Filters ......................................24-15
Ethernet traffic ........................................24-16
Ethernet Traffic.......................................24-16
Filter Rules................................................24-5
Filter Structure ..........................................24-3
Generic Filter Rule..................................24-11
Remote Node ............................................21-6
Remote Node Filter...................................21-6
Remote Node Filters ...............................24-16
Sample ....................................................24-14
SUA ........................................................24-12
TCP/IP Filter Rule ....................................24-6
Filter Log ......................................................27-6
Filter Rule Process ........................................24-2
Filter Rule Setup ...........................................24-6
Filter Rules Summary
Sample ....................................................24-15
Filter Set
Class..........................................................24-6
Filter Set Configuration ................................24-3
Filtering................................................24-1, 24-6
Finger..............................................................9-6
Firewall ...........................................................1-4
Access Methods ........................................12-1
Connection Direction ................................12-3
Creating/Editing Rules............................12-10
Enabling....................................................12-1
Introduction...............................................11-2
LAN to WAN Rules..................................12-4
Policies......................................................12-1
Rule Checklist...........................................12-2
Rule Logic.................................................12-2
Rule Security Ramifications .....................12-2
Services...................................................12-12
Types.........................................................11-1
Firmware File
Maintenance...................................16-8, 16-10
Fragment Threshold ......................................19-7
Fragmentation Threshold ................................6-4
Frequency-Hopping Spread Spectrum ........... D-2
Index

Advertisement

Table of Contents
loading

Table of Contents