ZyXEL Communications 650 Series User Manual

Page 510

Advertising
background image

Prestige 650 Series User’s Guide

J-4 Index

IP Protocol .............................................................. 39-4
IP Routing Policy (IPPR)........................................ 39-1

Benefits...................................................... 39-1
Cost Savings.............................................. 39-1
Criteria....................................................... 39-1
Load Sharing ............................................. 39-1
Setup.......................................................... 39-2

IP Routing Policy Setup.......................................... 39-3
IP Spoofing....................................................10-4, 10-7
IP Static Route ........................................................ 28-1
IP Static Route Setup .............................................. 28-2
IPSec standard .......................................................... 1-4
IPSec VPN Capability .............................................. 1-4
ISDN........................................................................ G-2

K

Key Fields For Configuring Rules .......................... 12-2

L

LAN........................................................................ 35-3
LAN Setup.........................................................4-1, 6-1
LAN TCP/IP............................................................. 4-2
LAN to WAN Rules ............................................... 12-3
LAND............................................................10-4, 10-6
Link type................................................................. 35-2
LLC-based Multiplexing....................................... 27-13
Local Network

Rule Summary........................................... 12-7

Log and Trace......................................................... 35-5
Log Descriptions...................................................... H-1
Log Facility ............................................................ 35-7
Logging Option..........................................31-12, 31-15
Login ...................................................................... 27-4
Logs ........................................................................ 19-1

M

MAC address .......................................................... 29-4
MAC Address Filter ............................................... 25-3
MAC Address Filter Action.............................5-9, 25-4
MAC Address Filtering ............................................ 5-7
Main Menu ............................................................. 22-4
Management Information Base (MIB).................... 33-2
Maximize Bandwidth Usage........................20-4, 20-11
Max-incomplete High............................................. 11-4

Max-incomplete Low ............................................. 11-4
MBS ...................................... See Maximum Burst Size
Media Access Control ............................................ 29-1
Message Logging ................................................... 35-5
Metric ...................................................27-5, 27-8, 28-3
Multicast.......................................................... 4-3, 27-8
Multiplexing

LLC-based....................................................3-2
VC-based......................................................3-2

Multiplexing ...................................1-6, 3-2, 26-6,

27-2

Multiprotocol Encapsulation .................................... 3-2
My WAN Address.................................................. 27-7

N

Nailed-Up Connection.............................................. 3-6
NAT.................................................3-4, 7-5, 7-7, 31-16

Application...................................................7-2
Applying NAT in the SMT Menus.............30-1
Configuring ................................................30-3
Definitions....................................................7-1
Examples..................................................30-11
How NAT Works .........................................7-2
Mapping Types ............................................7-3
Non NAT Friendly Application Programs30-17
Ordering Rules ...........................................30-6
Server Sets....................................................7-5
What NAT does............................................7-1

NAT Traversal........................................................ 18-1
NetBIOS commands............................................... 10-7
Network Address Translation................................. 26-7
Network Address Translation (NAT) ..................... 30-1
Network Management ....................................... 1-6, 7-6
NNTP ....................................................................... 7-6

O

One-Minute High ................................................... 11-4

P

Packet

Error ...........................................................35-2
Received.....................................................35-3
Transmitted ................................................35-3

Packet Filtering..................................................... 10-12

Advertising