Zyxel-communications Broadband Security Gateway P-312 Instrukcja Użytkownika Strona 251

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 250
P312 Broadband Security Gateway
DD Index
Encapsulation
PPP over Ethernet....................................................E
Ethernet Encapsulation3-8, 4-1, 4-5, 4-6, 4-10, 6-
11, 6-12
Example E-Mail Log........................................15-6
Examples ........................................................19-1
F
Factory Default................................................2-11
Filename Conventions.....................................10-1
Filter ................................................. 2-12, 4-9, 7-1
About....................................................................7-1
Applying............................................................. 7-17
Configuring..........................................................7-4
Example..............................................................7-14
Filter log...............................................................9-7
Generic Filter Rule............................................. 7-12
NAT ...................................................................7-16
Structure...............................................................7-2
Filters
Executing a Filter Rule.........................................7-2
Logic Flow of an IP Filter..................................7-10
Firewall
Address Type.................................................... 16-11
Alerts..................................................................15-3
Connection Direction .........................................16-3
Creating/Editing Rules ....................................... 16-8
E-Mail ................................................................ 15-3
Guidelines For Enhancing Security....................13-9
Logs.................................................................... 15-4
Policies...............................................................16-1
Rule Logic.......................................................... 16-1
Rule Precedence ................................................. 16-6
Services .............................................................. 16-4
SMT Log............................................................14-2
SMT Menus........................................................14-1
Types..................................................................13-1
Vs Filters............................................................14-6
Web Configurator............................................... 15-1
When To Use...................................................... 14-7
Flow Control......................................................2-4
Front Panel LEDs..............................................2-1
FTP File Transfer ............................................10-7
FTP Server.............................................. 1-3, 6-17
G
General Setup...................................................2-8
H
Half-Open Sessions........................................15-8
Hidden Menus...................................................2-5
Housing.............................................................2-4
HTTP....................6-13, 13-1, 13-3, 13-4, U, X, AA
I
IANA ..........................................................3-1, 3-2
ICMP echo.............................................13-5, 14-3
idle timeout .......................................................4-3
IGMP (Internet Group Multicast Protocol) .........3-3
Initial Screen.....................................................2-4
Installation Requirements .................................2-3
Internet access..................................................3-1
Internet Access Setup........ 2-6, 3-8, 3-9, 6-4, 21-2
Internet Assigned Numbers Authority .... See IANA
Internet Control Message Protocol (ICMP)13-5,
14-3
IP address..................................................3-1, 3-6
IP Address Assignment.............................4-6, 4-8
IP Alias Setup ...................................................3-7
IP Multicast ................................................1-2, 3-3
Internet Group Management Protocol (IGMP) .... 1-2
IP Network Number...........................................3-1
IP Pool ..............................................................3-3
IP Ports...........................................................13-4
IP Spoofing .............................. 13-4, 13-6, 14-2, Z
IP Static Route....................................5-1, 5-2, 5-3
J
Java ................................................................20-1
Java VM..........................................................20-1
K
Key Fields For Configuring Rules ...................16-2
Keyword..........................................................20-2
Przeglądanie stron 250
1 2 ... 246 247 248 249 250 251 252 253 254

Komentarze do niniejszej Instrukcji

Brak uwag