ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Page 613

Advertising
background image

ZyWALL 2 Series User’s Guide

Index

Q-7

System Management Terminal ...................... 21-2
System Name ..........................................4-2, 22-1
System Status ................................................. 32-1
System Timeout ............................................. 17-2

T

TCP Maximum Incomplete....11-21, 11-22, 11-24
TCP Security................................................ 10-10
TCP/IP .10-3, 10-4, 17-19, 23-9, 24-2, 24-3, 24-4,

26-7, 30-6, 30-7, 30-9, 30-12, 30-16

Setup .................................................................. 24-4

TCP/IP and DHCP Setup ............................... 24-2
TCP/IP filter rule............................................ 30-6
Teardrop......................................................... 10-4
Telnet ........................................................... 17-19
Telnet Configuration .................................... 17-19
Terminal Emulation ....................................... 21-1
TFTP .............................................................. 33-5

File Upload ...................................................... 33-13
GUI-based Clients.............................................. 33-6

TFTP and FTP over WAN ............................. 33-5
TFTP and FTP over WAN Will Not Work

When…...................................................... 33-5

TFTP and FTP Over WAN} .................17-2, 35-3
TFTP Restrictions ........................17-2, 33-5, 35-3
Three-Way Handshake................................... 10-5
Threshold Values ......................................... 11-21
Time and Date.................................................. 1-2
Time and Date Setting..................34-5, 34-6, 34-7
Time Zone...............................................4-7, 34-7
Timeout..................... 23-7, 23-8, 25-4, 25-5, 26-5
TLS ..................................................................F-1
Trace .............................................................. 32-5
Traceroute ...................................................... 10-7
Tracing ............................................................. 1-6
Trademarks ......................................................... ii
Traffic Redirect..............................1-5, 6-14, 6-15

Setup ................................................................ 26-11

Transport Layer Security .........................See TLS
Triangle........................................................... C-1
Triangle Route\ Solutions ............................... C-2

Trigger Port Forwarding .............................. 28-16

Process..............................................................28-17

Trivial File Transfer Protocol ................ See TFTP
Troubleshooting...............................................A-1

Internet Access.....................................................A-3
LAN Interface......................................................A-2
WAN Interface.....................................................A-2

TTLS................................................................ F-1
Tunneled Transport Layer Service.........See TTLS

U

UDP/ICMP Security .................................... 10-10
Universal Plug and Play................................... 1-4
Universal Plug and Play (UPnP)........... 18-1, 18-3
UNIX Syslog ................................................. 32-6
Upload Firmware ......................................... 33-11
UPnP................................................................ 1-4
UPnP Examples ............................................. 18-5
Upper Layer Protocols...................... 10-10, 10-11
Use Server Detected IP.................................. 22-4
User Name .............................................. 4-5, 22-3
User Profiles ........................................... 7-9, 16-1
User Specified IP Addr.................................. 22-4

V

VPN ........................................................ 6-7, 25-3
VT100............................................................ 21-1

W

WAN DHCP ..................................... 32-10, 32-11
WAN Setup....................................3-10, 6-2, 23-1
WAN to LAN Rules ...................................... 11-4
Warranty ..............................................................v
Web Configurator 2-1, 2-3, 10-2, 10-11, 11-3, 29-

2

Web Site Hits........................................ 19-7, 19-8
WEP Encryption .............................................. 7-5
Wireless LAN ..................................................D-1

Benefits................................................................D-1

Advertising