ZyXEL Communications P-312 User Manual

Page of 254
P312  Broadband Security Gateway
Index
CC
Index
A
Action for Matched Packets .......................... 16-10
Activate The Firewall ...................................... 19-2
ActiveX ........................................................... 20-1
Add Keyword .................................................. 20-3
Alert Schedule ................................................ 15-5
Application-level Firewalls .............................. 13-1
AT command .................................................. 10-1
Attack
Reasons .............................................................. 18-2
Attack Alert ................................. 15-7, 15-9, 15-10
Attack Types................................................... 14-3
Reason................................................................ 14-5
Authentication............................................ 4-3, 4-4
B
BackOrifice .......................................................... R
backup............................................................ 10-2
Big Picture
Filtering, Firewall and NAT............................... 14-5
Block Web URLs ............................................ 20-3
Blocking Time ............................. 15-8, 15-9, 15-11
Blocking URLs ................................................ 20-2
Boot commands.............................................. 11-7
Broadband Security Gateway ............ i, ii, xxvii, 1-1
Brute Force Hacking............................................ R
Budget Management ............................. 11-2, 11-3
C
Cable Modem ................................... 2-2, 2-3, 13-2
Call Control..................................................... 11-2
Call History ............................................ 11-3, 11-4
Call-Trigerring Packet..................................... 9-10
CDR.................................................................. 9-7
CHAP ............................................................... 4-4
CLI Commands.................................................... K
COM (Component Object Model) ................... 20-1
Command Interpreter Mode ........................... 11-1
Configuring A POP Custom Port .................... 19-8
Configuring A Rule ..........................................19-5
console port.......................................................2-3
Console Port ................................... 2-3, 9-4, 9-5, I
Content Filtering ..............................................20-1
Cookies ...........................................................20-2
Custom Ports
Creating/Editing..................................................17-2
Introduction ........................................................17-1
Customer Support ..............................................viii
Customized Services.......................................17-2
D
DDNS
Configuration........................................................2-9
Default Permit Log ..........................................16-7
Denial of Service ................. 13-2, 13-3, 14-1, 15-8
Denial of Services
Thresholds ........................................................15-10
DestAdd ........................................................19-10
Destination Address .............................. 16-2, 16-9
DHCP ................................................................3-3
DHCP (Dynamic Host Configuration Protocol)1-2,
3-3
DHCP Negotiation .........................................19-11
Diagnostic .......................................................9-10
DNS........................................................... 3-3, 3-6
Domain Name ....................... 3-3, 6-13, 9-3, 9-5, T
DoS
Basics..................................................................13-3
Types ..................................................................13-4
DoS (Denial of Service).....................................1-1
Dynamic DNS............................................ 2-8, 2-9
DYNDNS Wildcard ............................................2-8
E
EG 2 - Internet Rule Summary ......................19-11
EG 2 - Local Network Rule Summary............19-10
EG3 - Rule Summary ....................................19-14
E-Mail Alerts....................................................15-5
E-Mail Screen..................................................19-3
E-Mail tab ........................................................15-4