ZyXEL p-660h-61 Guia Do Utilizador
Prestige 660H Series User’s Guide
Index
I-1
Appenidx I
Index
A
Action for Matched Packets....................... 12-8
Address Assignment .................................... 5-2
ADSL, what is it? ....................................... xxii
Alert ........................................................... 11-3
Alternative Subnet Mask Notation ............. B-2
Application-level Firewalls ....................... 10-1
AT command ............................................. 34-1
Attack Alert ............................................... 11-1
Attack Types.............................................. 10-5
Authentication...................................25-4, 25-5
auto-negotiation ........................................... 1-2
Address Assignment .................................... 5-2
ADSL, what is it? ....................................... xxii
Alert ........................................................... 11-3
Alternative Subnet Mask Notation ............. B-2
Application-level Firewalls ....................... 10-1
AT command ............................................. 34-1
Attack Alert ............................................... 11-1
Attack Types.............................................. 10-5
Authentication...................................25-4, 25-5
auto-negotiation ........................................... 1-2
B
Backup ....................................................... 34-2
Bandwidth Borrowing ............................... 18-5
Bandwidth Class ........................................ 18-1
Bandwidth Filter .............................18-1, 18-10
Bandwidth Management............................ 18-1
Bandwidth Management Statistics........... 18-11
Bandwidth Manager Class Configuration.. 18-9
Bandwidth Manager Class Setup............... 18-8
Bandwidth Manager Monitor .................. 18-12
Bandwidth Manager Summary .................. 18-7
Blocking Time ..................................11-2, 11-3
Borrow bandwidth from parent class....... 18-10
Bridging ..................................................... 23-2
Bandwidth Borrowing ............................... 18-5
Bandwidth Class ........................................ 18-1
Bandwidth Filter .............................18-1, 18-10
Bandwidth Management............................ 18-1
Bandwidth Management Statistics........... 18-11
Bandwidth Manager Class Configuration.. 18-9
Bandwidth Manager Class Setup............... 18-8
Bandwidth Manager Monitor .................. 18-12
Bandwidth Manager Summary .................. 18-7
Blocking Time ..................................11-2, 11-3
Borrow bandwidth from parent class....... 18-10
Bridging ..................................................... 23-2
Ether Address......................................... 27-3
Ethernet.................................................. 27-1
Ethernet Addr Timeout .......................... 27-3
Remote Node ......................................... 27-1
Static Route Setup.................................. 27-3
Ethernet.................................................. 27-1
Ethernet Addr Timeout .......................... 27-3
Remote Node ......................................... 27-1
Static Route Setup.................................. 27-3
Brute-force Attack, .................................... 10-4
Budget Management.........................35-2, 35-3
BW Budget .............................................. 18-10
Budget Management.........................35-2, 35-3
BW Budget .............................................. 18-10
C
Call Filtering.............................................. 30-1
Call Filters
Call Filters
Built-In................................................... 30-1
User-Defined.......................................... 30-1
User-Defined.......................................... 30-1
Call Scheduling.......................................... 38-1
Maximum Number of Schedule Sets ..... 38-1
PPPoE .................................................... 38-3
PPPoE .................................................... 38-3
Precedence .............................................38-1
Precedence Example .............See precedence
Precedence Example .............See precedence
CDR ...........................................................33-6
CDR (Call Detail Record)..........................33-6
CHAP.........................................................25-4
Class Name ..............................................18-10
Classes of IP Addresses .............................. B-1
Collision.....................................................33-2
Command Interpreter Mode.......................35-1
Community ................................................31-2
Compact Guide ............................................2-1
Computer Name .........................................21-1
Conditions that prevent TFTP and FTP from
CDR (Call Detail Record)..........................33-6
CHAP.........................................................25-4
Class Name ..............................................18-10
Classes of IP Addresses .............................. B-1
Collision.....................................................33-2
Command Interpreter Mode.......................35-1
Community ................................................31-2
Compact Guide ............................................2-1
Computer Name .........................................21-1
Conditions that prevent TFTP and FTP from
working over WAN................................34-3
Configuration ..................................... 3-9, 19-4
Content Filtering ........................................14-1
Content Filtering ........................................14-1
Categories ..............................................14-1
Exempt Computers.................................14-3
Keywords ..................................... 14-1, 14-2
Exempt Computers.................................14-3
Keywords ..................................... 14-1, 14-2
Copyright ........................................................ii
Cost Of Transmission....................... 25-6, 26-3
Country Code .............................................33-4
CPU Load...................................................33-3
Custom Ports
Cost Of Transmission....................... 25-6, 26-3
Country Code .............................................33-4
CPU Load...................................................33-3
Custom Ports
Creating/Editing .....................................13-2
Introduction............................................13-1
Introduction............................................13-1
Customer Support ........................................... v
Customized Services ..................................13-1
Customized Services ..................................13-1
D
Data Filtering .............................................30-1
Default Policy Log.....................................12-4
Denial of Service............10-2, 10-3, 11-2, 29-1
Destination Address ......................... 12-2, 12-8
Device Filter rules....................................30-10
DHCP.................. 1-3, 3-9, 5-2, 8-1, 19-4, 33-4
Diagnostic Tools ........................................33-1
Digital Subscriber Line Access Multiplexer 1-5
DNS............................................................23-3
Domain Name ...................................... 5-2, 7-5
Domain Name System .................................5-1
DoS
Default Policy Log.....................................12-4
Denial of Service............10-2, 10-3, 11-2, 29-1
Destination Address ......................... 12-2, 12-8
Device Filter rules....................................30-10
DHCP.................. 1-3, 3-9, 5-2, 8-1, 19-4, 33-4
Diagnostic Tools ........................................33-1
Digital Subscriber Line Access Multiplexer 1-5
DNS............................................................23-3
Domain Name ...................................... 5-2, 7-5
Domain Name System .................................5-1
DoS
Basics .....................................................10-3
Types......................................................10-3
Types......................................................10-3
DoS (Denial of Service)...............................1-2