ZyXEL p-660h-61 Betriebsanweisung
Prestige 660H Series User’s Guide
I-2
Index
DSL (Digital Subscriber Line)....................xxii
DSL, What Is It? .........................................xxii
DSLAM ....See Digital Subscriber Line Access
DSL, What Is It? .........................................xxii
DSLAM ....See Digital Subscriber Line Access
Multiplexer
Dynamic DNS............................. 1-3, 8-1, 21-2
DYNDNS Wildcard .....................................8-1
DYNDNS Wildcard .....................................8-1
E
ECHO...........................................................7-5
E-mail
Log Example..........................................17-5
Encapsulation.....................1-4, 3-1, 24-5, 25-2
ENET ENCAP .........................................3-1
PPP over Ethernet ....................................3-1
PPPoA......................................................3-1
RFC 1483.................................................3-1
PPP over Ethernet ....................................3-1
PPPoA......................................................3-1
RFC 1483.................................................3-1
Error Log....................................................33-5
Error/Information Messages
Error/Information Messages
Sample ...................................................33-5
Ethernet Traffic........................................30-14
Example Internal SPTGEN Screens ........... E-1
Example Internal SPTGEN Screens ........... E-1
F
Factory LAN Defaults..................................5-2
Fairness-based Scheduler...........................18-3
FCC................................................................iii
Filename Conventions ...............................34-1
Filter...........................................................23-1
Fairness-based Scheduler...........................18-3
FCC................................................................iii
Filename Conventions ...............................34-1
Filter...........................................................23-1
Applying Filters ...................................30-13
Ethernet traffic .....................................30-14
Ethernet Traffic....................................30-13
Filter Rules.............................................30-4
Filter Structure .......................................30-2
Generic Filter Rule.................................30-8
Remote Node .........................................25-7
Remote Node Filter................................25-7
Remote Node Filters ............................30-14
Sample .................................................30-12
SUA .....................................................30-10
TCP/IP Filter Rule .................................30-5
Ethernet traffic .....................................30-14
Ethernet Traffic....................................30-13
Filter Rules.............................................30-4
Filter Structure .......................................30-2
Generic Filter Rule.................................30-8
Remote Node .........................................25-7
Remote Node Filter................................25-7
Remote Node Filters ............................30-14
Sample .................................................30-12
SUA .....................................................30-10
TCP/IP Filter Rule .................................30-5
Filter Log ...................................................33-7
Filter Rule ..................................................30-6
Filter Rule Process .....................................30-2
Filter Rule Setup ........................................30-5
Filter Rules Summary
Filter Rule ..................................................30-6
Filter Rule Process .....................................30-2
Filter Rule Setup ........................................30-5
Filter Rules Summary
Sample .................................................30-13
Filter Set
Class.......................................................30-5
Filter Set Configuration .............................30-3
Filtering............................................ 30-1, 30-5
Filtering............................................ 30-1, 30-5
Filtering Process
Outgoing Packets................................... 30-1
Finger .......................................................... 7-5
Firewall
Firewall
Access Methods..................................... 29-1
Address Type......................................... 12-9
Alerts ..................................................... 11-2
Connection Direction ............................ 12-2
Creating/Editing Rules .......................... 12-7
Custom Ports .....................See Custom Ports
Enabling ................................................ 11-1
Firewall Vs Filters............................... 10-10
Guidelines For Enhancing Security....... 10-9
Introduction ........................................... 10-2
LAN to WAN Rules.............................. 12-2
Policies .................................................. 12-1
Remote Management.................... 11-1, 29-1
Rule Checklist ....................................... 12-1
Rule Logic............................................. 12-1
Rule Precedence .................................... 12-3
Rule Security Ramifications.................. 12-2
Services ................................................. 12-5
SMT Menus........................................... 29-1
Types ..................................................... 10-1
When To Use....................................... 10-11
Address Type......................................... 12-9
Alerts ..................................................... 11-2
Connection Direction ............................ 12-2
Creating/Editing Rules .......................... 12-7
Custom Ports .....................See Custom Ports
Enabling ................................................ 11-1
Firewall Vs Filters............................... 10-10
Guidelines For Enhancing Security....... 10-9
Introduction ........................................... 10-2
LAN to WAN Rules.............................. 12-2
Policies .................................................. 12-1
Remote Management.................... 11-1, 29-1
Rule Checklist ....................................... 12-1
Rule Logic............................................. 12-1
Rule Precedence .................................... 12-3
Rule Security Ramifications.................. 12-2
Services ................................................. 12-5
SMT Menus........................................... 29-1
Types ..................................................... 10-1
When To Use....................................... 10-11
Firmware File
Maintenance.......................................... 19-7
Frame Relay ................................................ 1-5
FTP............................. 7-4, 7-5, 8-1, 15-1, 36-2
FTP............................. 7-4, 7-5, 8-1, 15-1, 36-2
Restrictions............................................ 36-2
FTP File Transfer ...................................... 34-6
FTP Restrictions............................... 15-1, 34-3
FTP Server .............................................. 28-12
Full Rate ......................................................G-1
FTP Restrictions............................... 15-1, 34-3
FTP Server .............................................. 28-12
Full Rate ......................................................G-1
G
Gateway..................................................... 26-3
Gateway Node........................................... 27-3
General Setup ............................................ 21-1
Gateway Node........................................... 27-3
General Setup ............................................ 21-1
H
Half-Open Sessions ................................... 11-2
Hidden Menus ........................................... 20-3
Hop Count ........................................ 25-6, 26-3
Host ............................................................. 4-1
Host IDs ......................................................B-1
HTTP.........................................7-5, 10-1, 10-3
Hidden Menus ........................................... 20-3
Hop Count ........................................ 25-6, 26-3
Host ............................................................. 4-1
Host IDs ......................................................B-1
HTTP.........................................7-5, 10-1, 10-3
I
IANA........................................................... 3-4