ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Page 611

Advertising
background image

ZyWALL 2 Series User’s Guide

Index

Q-5

N

Nailed-up Connection .................................... 26-4
Nailed-Up Connection ..........................23-7, 26-5
NAT .... 3-4, 3-9, 5-1, 8-5, 8-6, 23-10, 26-8, 30-16

Application........................................................... 8-3
Applying NAT in the SMT Menus .................... 28-1
Configuring........................................................ 28-3
Definitions ........................................................... 8-1
Examples............................................................ 28-9
How NAT Works................................................. 8-2
Mapping Types .................................................... 8-3
NAT Unfriendly Application Programs ........... 28-15
Ordering Rules................................................... 28-6
What NAT does ................................................... 8-1

NAT Traversal .............................18-1, 18-2, 18-3
NetBIOS commands ...................................... 10-7
Network Address Translation ........................ 25-2
Network Address Translation (NAT)......1-5, 28-1
Network Management...................................... 8-6
Network Topology With RADIUS Server

Example .......................................................E-2

NNTP ............................................................... 8-6
Notice................................................................. iii

O

Offline............................................................ 22-4
One Minute High ......................................... 11-23
One Minute Low .......................................... 11-23
One to One ..............................................See NAT
One-Minute High ......................................... 11-21
Online Registration ............................................. v
Outgoing Protocol Filters............................... 24-6
Outside ............................................................. 8-1

P

Packet Filtering .....................................1-3, 10-12
Packet Filtering Firewalls .............................. 10-1
Packing List Card.......................................... xxvii
PAP .......................................................23-6, 26-5
Password 4-5, 21-2, 21-6, 31-1. See My Password

Period(hr).............................................. 23-7, 26-5
Ping.............................................................. 32-11
Ping of Death ................................................. 10-4
Point-to-Point Tunneling Protocol.....3-6, 8-6. See

PPTP. See PPTP

POP3..............................................8-6, 10-3, 10-4
Port Configuration ....................................... 11-13
Port Forwarding ............................................... 1-5
PPP ................................................................ 23-8
PPPoE .......................................1-4, 3-2, 3-4, 25-4
PPPoE Encapsulation25-1, 25-4, 25-5, 26-1, 26-3,

26-5, 26-10

PPTP ......................... 3-2, 3-4, 3-6, 8-6, 25-3, H-1

Client ........................................................ 25-3, 25-4
Configuring a Client ................................. 25-3, 25-4

PPTP Encapsulation................1-4, 3-6, 25-3, 26-6
Private.................................9-4, 23-10, 26-8, 27-2
Private IP Address .................................... 3-8, 6-2
Protocol Filters............................................... 24-6

Incoming.............................................................24-6
Outgoing .............................................................24-6

Protocol/Port......................................... 19-7, 19-9

Q

Quick Start Guide ............................................ 2-1

R

RADIUS .......................................................... 7-7

Shared Secret Key.................................................7-8

RADIUS Message Types................................. 7-7
Related Documentation..................................xxvii

Rem IP Address

..............................................

23-9

Rem Node Name..........................23-6, 23-8, 26-2
Remote Management ..................................... 35-1
Remote Management and NAT ..................... 17-2
Remote Management Limitations......... 17-2, 35-3
Remote Node ................................................. 26-1

Profile (Traffic Redirect Field) .........................26-11

Remote Node Filter............................. 23-12, 26-9
Repairs.................................................................v

Advertising