Appendix K Index - ZyXEL Communications PRESTIGE 652H User Manual

Prestige 652 series adsl security/wireless lan router
Hide thumbs Also See for PRESTIGE 652H:
Table of Contents

Advertisement

Action for Matched Packets ......................... 13-11
Active.................................................. 24-8, 24-11
Address Assignment ........................................ 5-2
Ad-hoc Configuration ..................................... C-2
ADSL, what is it?......................................... xxviii
Allocated Budget ........................................... 24-9
Alternative Subnet Mask Notation.................. B-3
Application-level Firewalls............................ 11-1
AT command ...............................24-5, 24-6, 37-1
Attack Alert..................................12-2, 12-3, 12-4
Attack Types .................................................. 11-6
Authen............................................................ 24-9
Authentication..............................24-9, 28-4, 28-5
auto-negotiation ............................................... 1-3
Backup ........................................................... 37-2
Basic Service Set............................................. C-2
Blocking Time ............................................... 12-3
Bridging ......................................................... 25-2
Ether Address ............................................ 30-4
Ethernet...................................................... 30-1
Ethernet Addr Timeout .............................. 30-3
Remote Node ............................................. 30-1
Static Route Setup...................................... 30-3
Brute-force Attack,......................................... 11-6
BSS ..................................... See Basic Service Set
Budget Management ............................. 38-2, 38-3
call back delay................................................ 24-7
Call Filtering .................................................. 33-1
Call Filters
Built-In....................................................... 33-1
User-Defined ............................................. 33-1
Call Scheduling.............................................. 41-1
Maximum Number of Schedule Sets ......... 41-1
Index
A
B
C
Prestige 652 Series User's Guide
PPPoE........................................................ 41-3
Precedence................................................. 41-1
Precedence Example................. See precedence
CDR............................................................... 36-7
CDR (Call Detail Record).............................. 36-6
Channel ID..................................................... 26-2
CHAP ................................................... 24-9, 28-4
Classes of IP Addresses ...................................B-1
Collision......................................................... 36-3
Command Interpreter Mode........................... 38-1
Community .................................................... 34-2
Computer Name............................................. 23-1
Conditions that prevent TFTP and FTP from
working over WAN ................................... 37-4
Configuration........................................ 3-11, 21-6
Content Filtering............................................ 15-1
Categories.................................................. 15-1
Exempt Computers .................................... 15-4
Keywords ......................................... 15-1, 15-3
Copyright .............................................................ii
Cost Of Transmission ........................... 28-7, 29-3
Country Code................................................. 36-4
CPU Load ...................................................... 36-3
Custom Ports
Creating/Editing ........................................ 14-2
Introduction ............................................... 14-1
Customer Support ................................................v
Customized Services...................................... 14-2
Data encryption................................................ 6-4
Data Filtering ................................................. 33-1
Default Policy Log......................................... 13-5
Denial of Service ...... 11-2, 11-3, 12-2, 12-3, 32-1
Destination Address............................ 13-3, 13-11
Device Filter rules........................................ 33-15
DHCP .................... 1-4, 3-11, 5-2, 9-1, 21-6, 36-4
Diagnostic Tools............................................ 36-1
Appendix K
Index
D
K-1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents