ZyXEL Communications zywall 50 User Manual

Page of 322
ZyWALL 50 Internet Security Gateway 
Index 
Index 
Action for Matched Packets ..........................10-11 
Activate The Firewall.......................................13-3 
Alert Schedule...................................................9-5 
Application-level Firewalls.................................7-1 
Applications for the ZyWALL 10........................1-4 
AT command...................................................18-2 
Attack 
Reasons......................................................12-2 
Attack Alert.................................................9-7, 9-9 
Attack Types .....................................................7-6 
Reason .........................................................8-3 
Authentication ............................................4-4, 4-5 
auto-negotiation ................................................1-1 
backup ............................................................18-2 
Blocking Time ...................................9-8, 9-9, 9-11 
Boot Commands ..................................................K 
Broadband Access Security Gateway.... i, xxxi, 1-1 
Brute-force Attack, ............................................7-6 
Budget Management..............................19-2, 19-3 
Cable Modem......................................2-3, 2-4, 7-2 
Call Control .....................................................19-2 
Call History......................................................19-4 
Call Scheduling...............................................21-1 
maximum number of schedule sets ............21-1 
PPPoE ........................................................21-3 
precedence .................................................21-1 
precedence example................ See precedence  
Call-Trigerring Packet ...................................17-10 
CDR ................................................................17-7 
certification........................................................... v 
CHAP................................................................4-5 
CLI Commands ................................................... M 
Command Interpreter Mode............................ 19-1 
Conditions that prevent TFTP and FTP from 
working over WAN...................................... 18-4 
Configuring A POP Custom Port .................... 13-8 
Console Port..................... 2-3, 17-3, 17-4, 17-5, H 
Content Filtering ............................................. 14-1 
Categories .................................................. 14-1 
Customizing................................................ 14-2 
Days and Times.......................................... 14-1 
Exempt Computers ..................................... 14-1 
Filter List ..................................................... 14-1 
Keywords.................................................... 14-2 
Log Records ............................................... 14-2 
Restrict Web Features ................................ 14-1 
Update List ................................................. 14-1 
Copyright ..............................................................ii 
Custom Ports 
Creating/Editing .......................................... 11-3 
Introduction................................................. 11-1 
Customer Support .............................................. vii 
Customized Services ...................................... 11-2 
Default Policy Log........................................... 10-6 
Denial of Service .........................7-2, 7-3, 8-1, 9-8 
Denial of Services 
Thresholds.................................................. 9-10 
DestAdd........................................................ 13-11 
Destination Address............................. 10-3, 10-10 
DHCP (Dynamic Host Configuration Protocol) 1-3, 
5-2 
DHCP Ethernet Setup....................................... 5-5 
DHCP Negotaition and Syslog Connection from 
the Internet – EG 3 ................................... 13-12 
DHCP Negotiation ........................................ 13-12 
Diagnostic..................................................... 17-11 
DNS .................................................................. 5-2 
Domain Name.................................5-2, 6-13, 17-3 
DoS 
Basics ........................................................... 7-3