IGMP Snooping ..................................................................................................................... 159
13.1 Overview .......................................................................................................................... 159
Quality of Service (QoS)....................................................................................................... 163
14.1 Overview .......................................................................................................................... 163
14.7 Technical Reference ........................................................................................................ 173
14.7.1 DiffServ .................................................................................................................. 173
14.7.2 IEEE 802.1Q Tag ................................................................................................... 174
14.7.3 Token Bucket .......................................................................................................... 174
14.7.6 QoS Meter Types ................................................................................................... 176
Security.................................................................................................................................. 179
15.1 Overview .......................................................................................................................... 179
15.3 Technical Reference ........................................................................................................ 194
15.3.1 NAT Definitions ...................................................................................................... 194
15.3.2 What NAT Does ..................................................................................................... 195
15.3.3 How NAT Works ..................................................................................................... 195
15.3.4 Port Scanning ......................................................................................................... 196
15.3.5 ICMP Flood Attack ................................................................................................. 196
P-794H User's Guide
Table of Contents
15