Index
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 188
NT/2000 SAM Authentication Setup............................ 132
O Open Web Browser....................................................... 24
Operating Environment..................................................16
Overnight Replacement Service..................................156
P Packet Filter > ICMP......................................................52
Packet Filter Logs........................................................125
Packet Filter Rules.......................................................101
Packet Filters > Advanced...........................................104
Packet Filters > Enable/Disable Logging.....................105
Packet Filters > ICMP..................................................103
Packet Filters > Packet Filter Rules.............................101
Password Changing.................................................47, 48
Passwords - Changing...................................................30
Perfect Forward Secrecy................................... 7, 35, 107
PING..............................................................................52
PING to send packets continuously...............................52
Planning by System Administrator.................................22
Planning the Network.....................................................22
Plug-and-Play Security Appliance....................................8
Policy for Corporate Security.........................................21
POP3 Message Filtering................................................79
POP3 Proxy...................................................................77
POP3 SPAM filtering......................................................78
POP3 virus scanning.....................................................77
Port Scan Logs............................................................126
Power.............................................................................16
Power Up.......................................................................24
PPP................................................................................86
PPPoE...........................................................................87
PPTP...........................................................................112
PPTP Logs...................................................................124
PPTP packet passthrough...........................................104
PPTP users setup........................................................112
Processor Upgrade......................................................154
Product Description .........................................................7
Protection mechanisms..................................................18
Protocol
AH..............................................................................62
ESP............................................................................62
ICMP..........................................................................62
TCP & UDP................................................................62
Protocols........................................................................15
Proxies...........................................................................18
Proxies - General Information........................................65
Proxy > DNS..................................................................52
Proxy > DNS Proxy........................................................82
Proxy > SMTP................................................................71
Proxy > SMTP Proxy > Spam Filtering..........................74
Proxy > SOCKS Proxy...................................................80
Proxy >POP3 Proxy.......................................................77
Proxy Services & Authentication Methods...................130
R Rack Installation............................................................ 11
Rack Mounting.............................................................155
RADIUS.........................................................................56
RADIUS Authentication................................................131
RADIUS Prerequisite.....................................................56
RADIUS User Authentication.......................................130
Recording RouteFinder Information.............................161
Recovery CD...................................................................9
Regulatory Information.................................................164
Remote Client-to-LAN setup..........................................36
Remote Syslog Host......................................................44
Remote User................................................................. 15
Remote User example.................................................. 20
Removing the Top Cover............................................ 154
Reporting function........................................................... 7
Rescue Kernel.............................................................149
Restart.......................................................................... 58
RouteFinder Technology Overview............................... 17
Routes........................................................................... 90
Routing table............................................................... 118
RSA digital signatures..................................................... 7
RSA Key....................................................................... 98
Rules for Using SMTP Proxy........................................ 71
S SAM.............................................................................. 57
SAM Prerequisite.......................................................... 57
Save Settings................................................................ 42
Secure local or remote management.............................. 7
secure VPN connection...................................................8
Select encryption method............................................ 107
Self Monitor................................................................. 123
Serivces........................................................................ 61
Service Groups............................................................. 64
Services entered display on other screens................... 62
Services Update............................................................ 97
SHA1- Secure Hash Algorithm.................................... 109
Shared broadband.......................................................... 7
Shared Secret............................................................... 35
Shared secrets................................................................ 7
Ship Kit Contents............................................................ 9
Shut Down.................................................................... 58
Shutdown caution..........................................................23
Site Certificate............................................................... 49
SMTP............................................................................ 71
SMTP & POP3 Virus Quarantines...............................129
SMTP Proxy Accepted Incoming Domains................... 72
SMTP Proxy Logs....................................................... 121
SMTP Proxy Rules........................................................ 71
SMTP Spam filtering..................................................... 74
SMTP Spam Quarantines........................................... 129
SMTP Virus Scanning................................................... 72
SNAT............................................................................ 92
SOCKS Proxy............................................................... 80
SOCKS User................................................................. 55
Software........................................................................ 42
Software Add-ons........................................................156
Software Recovery CD..............................................9, 11
Source NAT ..................................................................18
Source Port................................................................... 61
SPAM filtering............................................................... 74
Specifications................................................................ 15
SSH allowed networks.................................................. 45
SSH Sentinel IPSec VPN Client Software...................156
SSH User...................................................................... 55
Stateful Packet Inspection............................................... 7
Statistics & Logs..........................................................116
Statistics & Logs > Accounting.................................... 122
Statistics & Logs > Administrative Authentication Log 129
Statistics & Logs > DHCP........................................... 128
Statistics & Logs > Hardware...................................... 117
Statistics & Logs > HTTP Access................................127
Statistics & Logs > Interfaces...................................... 120
Statistics & Logs > IPSec............................................ 124
Statistics & Logs > Networks.......................................118
Statistics & Logs > Packet Filters................................ 125
Statistics & Logs > Port Scans.................................... 126
Statistics & Logs > PPTP............................................ 124