ZyXEL p-660h-61 Guida Utente

Pagina di 354
Prestige 660H Series User’s Guide 
Index 
        I-1 
Appenidx I 
Index 
 
Action for Matched Packets....................... 12-8 
Address Assignment .................................... 5-2 
ADSL, what is it? ....................................... xxii 
Alert ........................................................... 11-3 
Alternative Subnet Mask Notation ............. B-2 
Application-level Firewalls ....................... 10-1 
AT command ............................................. 34-1 
Attack Alert ............................................... 11-1 
Attack Types.............................................. 10-5 
Authentication...................................25-4, 25-5 
auto-negotiation ........................................... 1-2 
Backup ....................................................... 34-2 
Bandwidth Borrowing ............................... 18-5 
Bandwidth Class ........................................ 18-1 
Bandwidth Filter .............................18-1, 18-10 
Bandwidth Management............................ 18-1 
Bandwidth Management Statistics........... 18-11 
Bandwidth Manager Class Configuration.. 18-9 
Bandwidth Manager Class Setup............... 18-8 
Bandwidth Manager Monitor .................. 18-12 
Bandwidth Manager Summary .................. 18-7 
Blocking Time ..................................11-2, 11-3 
Borrow bandwidth from parent class....... 18-10 
Bridging ..................................................... 23-2 
Ether Address......................................... 27-3 
Ethernet.................................................. 27-1 
Ethernet Addr Timeout .......................... 27-3 
Remote Node ......................................... 27-1 
Static Route Setup.................................. 27-3 
Brute-force Attack, .................................... 10-4 
Budget Management.........................35-2, 35-3 
BW Budget .............................................. 18-10 
Call Filtering.............................................. 30-1 
Call Filters 
Built-In................................................... 30-1 
User-Defined.......................................... 30-1 
Call Scheduling.......................................... 38-1 
Maximum Number of Schedule Sets ..... 38-1 
PPPoE .................................................... 38-3 
Precedence .............................................38-1 
Precedence Example .............See precedence  
CDR ...........................................................33-6 
CDR (Call Detail Record)..........................33-6 
CHAP.........................................................25-4 
Class Name ..............................................18-10 
Classes of IP Addresses .............................. B-1 
Collision.....................................................33-2 
Command Interpreter Mode.......................35-1 
Community ................................................31-2 
Compact Guide ............................................2-1 
Computer Name .........................................21-1 
Conditions that prevent TFTP and FTP from 
working over WAN................................34-3 
Configuration ..................................... 3-9, 19-4 
Content Filtering ........................................14-1 
Categories ..............................................14-1 
Exempt Computers.................................14-3 
Keywords ..................................... 14-1, 14-2 
Copyright ........................................................ii 
Cost Of Transmission....................... 25-6, 26-3 
Country Code .............................................33-4 
CPU Load...................................................33-3 
Custom Ports 
Creating/Editing .....................................13-2 
Introduction............................................13-1 
Customer Support ........................................... v 
Customized Services ..................................13-1 
Data Filtering .............................................30-1 
Default Policy Log.....................................12-4 
Denial of Service............10-2, 10-3, 11-2, 29-1 
Destination Address ......................... 12-2, 12-8 
Device Filter rules....................................30-10 
DHCP.................. 1-3, 3-9, 5-2, 8-1, 19-4, 33-4 
Diagnostic Tools ........................................33-1 
Digital Subscriber Line Access Multiplexer 1-5 
DNS............................................................23-3 
Domain Name ...................................... 5-2, 7-5 
Domain Name System .................................5-1 
DoS 
Basics .....................................................10-3 
Types......................................................10-3 
DoS (Denial of Service)...............................1-2