ZyXEL Communications Prestige 792H User Manual page 436

G.shdsl 4-port security gateway
Hide thumbs Also See for Prestige 792H:
Table of Contents

Advertisement

Prestige 792H User's Guide
Predefined Services ................................... 10-8
Source and Destination Addresses .......... 10-13
Summary ................................................... 10-6
Timeout ................................................... 10-14
SA Monitor .................................................... 37-1
Sample IP Addresses ..................................... 24-8
Saving the State ............................................... 8-7
Scalability ........................................................ 1-1
Schedule Sets
Duration..................................................... 34-2
SCR..................................... See Sustain Cell Rate
Security............................................................ 1-3
Security Association ...................................... 37-1
Security In General ........................................ 8-11
Security Ramifications................................... 10-2
Server....... .... 6-4, 27-3, 27-5, 27-8, 27-9, 27-10,
27-13, 27-14, 32-5
Service ....................................................... v, 10-2
Service Type ......................................... 11-3, 20-2
Services..................................................... 6-5, 6-6
Session Initiation Protocol ............................... 1-4
setup a schedule ............................................. 34-2
SIP ................................................................... 1-4
SMT Menu Overview .................................... 18-2
SMTP............................................................... 6-6
Smurf ............................................................... 8-6
SNMP ....................................................... 1-2, 6-6
Community................................................ 29-3
Configuration............................................. 29-2
Get ............................................................. 29-2
Manager..................................................... 29-2
MIBs.......................................................... 29-2
Trap ........................................................... 29-2
Trusted Host .............................................. 29-3
Source & Destination Addresses ................. 10-13
Source-Based Routing ................................... 33-1
Speed ............................................................... 1-1
SPI ............................................................... 36-13
E-6
S
Stateful Inspection ...............1-2, 8-1, 8-2, 8-7, 8-8
Prestige.........................................................8-9
Process .........................................................8-8
Static Routing Topology.................................25-1
SUA................................................... 1-3, 6-5, 6-6
SUA (Single User Account) ................... See NAT
Subnet Mask .... .3-6, 4-3, 10-14, 21-8, 22-5, 24-6,
25-3, 30-4
Supporting Disk.............................................. xxix
SYN Flood................................................ 8-4, 8-5
SYN-ACK ........................................................8-5
Syntax Conventions........................................ xxix
Syslog ................................................... 11-3, 30-6
Syslog IP Address ..........................................30-7
Syslog Server..................................................30-6
System
Console Port Speed ....................................30-5
Diagnostic ..................................................30-8
Log and Trace ............................................30-5
Syslog and Accounting ..............................30-6
System Information....................................30-3
System Status .............................................30-1
System Information ........................................30-3
System Maintenance..... ....30-1, 30-3, 31-2, 31-5,
31-13, 31-14, 32-1, 32-2, 32-4
System Management Terminal.......................18-4
System Parameter Table Generator ................38-1
System Status .................................................30-2
System Timeout.................................... 15-2, 35-3
TCP Maximum Incomplete ..............................9-5
TCP Security ..................................................8-10
TCP/IP...... 8-3, 8-4, 15-2, 21-7, 28-16, 30-9, 35-1
TCP/IP Options ..............................................24-9
Teardrop ...........................................................8-4
Telnet.................................................... 15-2, 35-1
Telnet Configuration ............................ 15-2, 35-1
Telnet Under NAT..........................................35-1
Text File Format.............................................38-1
TFTP
T
Index

Advertisement

Table of Contents
loading

Table of Contents