ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Page 612

Advertising
background image

ZyWALL 2 Series User’s Guide

Q-6 Index

Replacement ........................................................v
Reports........................................................... 19-6
Required fields............................................... 21-3
Reset Button .................................................... 1-2
Resetting the Time......................................... 34-7
Restore........................................................... 20-9
Restore Configuration.................................... 33-8
retry count...................................................... 23-5
retry interval .................................................. 23-5
Return Material Authorization Number...............v
RF signals ........................................................D-1
RIP..................... 5-2, 5-3, 23-10, 24-4, 24-6, 26-8

Direction............................................................. 24-6
Version ......................................................24-6, 26-8

RoadRunner Support ....................................... 1-6
Route.............................................................. 26-3
RTS Threshold................................................. 7-1
RTS/CTS handshake............................... 7-5,

24-7

Rule Summary ............................................. 11-17
Rules ..................................................... 11-1, 11-4

Checklist............................................................. 11-2
Creating Custom................................................. 11-1
Key Fields .......................................................... 11-3
LAN to WAN..................................................... 11-4
Logic .................................................................. 11-2
Predefined Services .......................................... 11-18
Source and Destination Addresses ................... 11-11

S

SA Monitor .................................................... 38-1
Safety Instructions ............................................J-1
Saving the State ............................................. 10-7
Schedule Sets

Duration ............................................................. 36-2

Schedules ....................................................... 26-5
Security Association ...................................... 38-1
Security Ramifications................................... 11-2
Select .............................. See Syntax Conventions
Server4-9, 8-4, 25-2, 26-3, 28-3, 28-5, 28-8, 28-9,

28-11, 28-12, 34-7

Server IP ........................................................ 26-3
Service ....................................................... v, 11-3

Service Name .................................................26-2
Service Set........................................................7-5
Service Type...................... 11-13, 25-2, 26-2, A-2
Services ............................................................8-5
Set Up a Schedule...........................................36-2
SMT...... 21-2. See System Management Terminal
SMT Menus at a Glance .................................21-4
SMTP ...............................................................8-5
Smurf..............................................................10-6
SNMP ............................................ 1-5, 8-6, 17-22

Community ........................................................ 31-1
Configuration ..................................................... 31-1
Get.................................................................... 17-24
Manager ........................................................... 17-23
MIBs ................................................................ 17-24
Trap.................................................................. 17-24
Trusted Host....................................................... 31-1

SNMP ( Simple Network Management Protocol)

......................................................................1-5

Source & Destination Addresses ..................11-11
Source Address................................... 11-3, 11-10
Stateful Inspection.......1-3, 10-1, 10-2, 10-7, 10-8

Process ............................................................... 10-8
ZyWALL ........................................................... 10-9

Static Route ......................................................9-1
SUA................................................... 8-5, 8-6, 8-7
SUA (Single User Account) ...See NAT. See NAT
SUA Only............................................... See NAT
Subnet Mask3-9, 5-1, 11-12, 23-9, 24-4, 25-2, 26-

7, 27-2

Subnet Masks ................................................... I-2
Subnetting......................................................... I-2
Support Disk..................................................xxvii
SYN Flood............................................ 10-4, 10-5
SYN-ACK ......................................................10-5
Syntax Conventions.......................................xxvii
Syslog ...........................................................11-13
Syslog IP Address ..........................................32-6
System Information ..................... 32-1, 32-3, 32-4
System Maintenance.19-2, 32-1, 32-2, 32-3, 32-4,

32-5, 32-6, 32-10, 32-11, 33-2, 33-5, 33-13,
33-15, 34-1, 34-3, 34-4, 34-6, 34-7

Advertising