ZyXEL Communications 792H User Manual

Page 426

Advertising
background image

Appendices and Index

Index

xi

Metric................................... 5-1, 21-8, 24-6, 25-3
Multicast ........................................4-3, 21-9, 24-7
Multiple Protocol over ATM ........................... 1-3
Multiplexing

LLC-based ................................................... 3-3
VC-based ..................................................... 3-3

Multiplexing...................................3-3, 23-2, 24-2
Multiprotocol Encapsulation............................ 3-3
My Login ....................................................... 21-5
My Password.................................................. 21-5
My WAN Address ................................21-8, 24-6
Nailed-Up Connection ............................3-9, 21-6
NAT .............................. 3-7, 6-5, 6-7, 21-8, 28-16

Application .................................................. 6-2
Applying NAT in the SMT Menus ............ 27-1
Configuring................................................ 27-3
Definitions ................................................... 6-1
Examples ................................................. 27-11
How NAT Works......................................... 6-2
Mapping Types ............................................ 6-3
Non NAT Friendly Application Programs27-18
Ordering Rules........................................... 27-6
Server Sets ................................................... 6-5
What NAT does ........................................... 6-1

NAT Traversal ............................................... 16-1
NetBIOS commands ........................................ 8-7
Network Address Translation ........................ 23-3
Network Address Translation (NAT)............. 27-1
Network Management...............................1-4, 6-6
NNTP ............................................................... 6-6
One-Minute High ........................................... 9-4
Packet

Error........................................................... 30-2
Received .................................................... 30-3
Transmitted................................................ 30-2

Packet Filtering .............................................. 8-12
Packet Filtering Firewalls ................................ 8-1
Packet Triggered ............................................ 30-7
Packets ........................................................... 30-2
PAP .......................................................21-5, 24-4
PAP (Password Authentication Protocol) ........ 1-3

Password..................... 2-3, 19-1, 19-6, 24-4, 29-2
Period(hr)....................................................... 21-6
Ping................................................................ 30-9
Ping of Death ................................................... 8-4
Point-to-Point Tunneling Protocol................... 6-6
policy-based routing ...................................... 33-1
POP3..................................................6-6, 8-3, 8-4
Port Configuration ......................................... 11-3
Port Numbers................................................... 6-6
PPP ................................................................ 21-7
PPP Encapsulation ....................................... 24-10
PPP Log ................................................ 30-7, 30-8
PPP over ATM................................................. 1-3
PPPoA........................................................... 24-2
PPTP ................................................................ 6-6
Precedence ............................................ 33-1, 33-4
Prestige Firewall Application .......................... 8-3
Private..........................................21-9, 24-7, 25-3
Protocol........................................................ 28-11
Protocol Filter Rules .................................... 28-16
Protocols Supported......................................... 1-3
Quality of Service .......................................... 33-1
Quick Start Guide ................................... 2-1, 16-2
RAS ...................................................... 30-4, 33-2
Rate

Receiving................................................... 30-2
Transmission ............................................. 30-2

Rem IP Address

..............................................

21-8

Rem Node Name................................... 21-5, 21-7
Remote DHCP Server.................................... 22-5
Remote Management

Firewall........................................................ 9-1

Remote Management and NAT ..................... 15-1
Remote Management Limitations......... 15-1, 35-3
Remote Management Setup ........................... 35-2
Remote Node ....................................... 24-1, 30-2

Remote Node Setup ........................ 24-1, 24-2

Remote Node Filter........................................ 21-9
Remote Node Index Number ......................... 30-2
Remote Node Traffic ................................... 28-21
Required fields............................................... 19-4
Restore Configuration.................................... 31-7

Advertising