ZyXEL p-660h-61 Guia Do Utilizador

Página de 354
Prestige 660H Series User’s Guide 
I-4 
Index 
Ordering Rules .......................................28-6 
What NAT does .......................................7-1 
NAT Traversal ...........................................16-1 
NetBIOS commands ..................................10-5 
Network Address Translation ....................24-5 
Network Address Translation (NAT) ........28-1 
Network Management.......................... 1-4, 7-5 
NNTP ...........................................................7-5 
One-Minute High .......................................11-2 
Packet 
Error .......................................................33-2 
Received.................................................33-2 
Transmitted ............................................33-2 
Packet Filtering ........................................10-10 
Packet Filtering Firewalls ..........................10-1 
Packet Triggered ........................................33-7 
Packets .......................................................33-2 
PAP ............................................................25-4 
Password ....... 4-1, 20-1, 20-4, 25-3, 25-4, 31-2 
Ping ............................................................33-8 
Ping of Death .............................................10-3 
Point-to-Point..............................................xxii 
Point-to-Point Tunneling Protocol...............7-5 
policy-based routing...................................37-1 
POP3 .................................................. 7-5, 10-3 
Port Configuration .....................................13-2 
Port Numbers ...............................................7-5 
PPP Encapsulation .....................................25-9 
PPP Log .....................................................33-7 
PPPoA........................................................25-2 
PPTP ............................................................7-5 
Precedence ....................................... 37-1, 37-4 
Prestige Firewall Application ....................10-2 
Priority .....................................................18-10 
Priority-based Scheduler............................18-3 
Private .............................................. 25-6, 26-3 
Proportional Bandwidth Allocation ...........18-1 
Protocol......................................................30-6 
Protocol Filter Rules ................................30-10 
Quality of Service ......................................37-1 
RAS.................................................. 33-4, 37-1 
Rate 
Receiving............................................... 33-2 
Transmission ......................................... 33-2 
Read Me First................................................xx 
Related Documentation .................................xx 
Remote DHCP Server ............................... 23-3 
Remote Management 
Firewall ........................................ 11-1, 29-1 
Remote Management and NAT................. 15-1 
Remote Management Limitations .... 15-1, 36-2 
Remote Management Setup ...................... 36-1 
Remote Node.................................... 25-1, 33-2 
Remote Node Profile............................. 25-3 
Remote Node Setup...................... 25-1, 25-2 
Remote Node Index Number..................... 33-2 
Remote Node Traffic............................... 30-14 
Required fields .......................................... 20-3 
Restore Configuration ............................... 34-5 
RFC-1483.................................................. 25-2 
RFC-2364......................................... 25-2, 25-3 
RIP...........23-3, 25-6. See Routing Information 
Protocol  
Root Class ................................................. 18-8 
Routing Information Protocol ..................... 5-2 
Direction.................................................. 5-2 
Version .................................................... 5-3 
Routing Policy........................................... 37-1 
Rule Summary.................................. 12-3, 13-5 
Rules................................................. 12-1, 12-3 
Checklist................................................ 12-1 
Creating Custom.................................... 12-1 
Key Fields ............................................. 12-2 
LAN to WAN ........................................ 12-2 
Logic ..................................................... 12-1 
Predefined Services ............................... 12-5 
Source and Destination Addresses ........ 12-9 
Summary ............................................... 12-3 
Timeout ............................................... 12-10 
Sample IP Addresses................................. 25-6 
Saving the State......................................... 10-6 
Schedule Sets 
Duration................................................. 38-2 
Scheduler.......................................... 18-3, 18-8 
SCR .................................See Sustain Cell Rate 
Security In General.................................... 10-9 
Security Ramifications .............................. 12-2 
Server ....7-3, 7-4, 28-3, 28-5, 28-7, 28-8, 28-9, 
28-11, 28-12, 35-5 
Service.................................................. iv, 12-2 
Service Type...................................... A-2, 13-2