Web OS 10.0 Application Guide
Index 481
212777-A, February 2002
service ports..............................................128, 171
setting multiple response count...........................432
shared services.................................................. 118
SIP (source IP address for filtering).....................178
smask
source mask for filtering.............................. 178
SMTP ..............................................................304
SNMP................................................................ 74
Spanning-Tree Protocol
eliminating bridge loops with VRRP............. 279
multiple instances......................................... 51
replacing with hot-standby failover............... 275
VLANs .................................................48, 49
spoofing, prevention of........................................99
sport (filtering option)................................186, 209
SSHRSA host and server keys ............................109
SSH/SCP
configuring................................................ 111
supported client commands ..........................112
stateful failover................................................. 283
static NAT........................................................191
static session entries...........................................158
statistical load distribution....................................66
STP bridge PDUs................................................ 48
streaming media................................................ 155
summarizing routes............................................. 77
switch failover.................................................. 253
switch management
security........................................................99
via IP interface............................................. 45
switch ports VLANs membership......................... 44
syslog
messages ...................................................170
T
tagging. See VLANs tagging.
TCP................................................. 171, 188, 189
health checking using ..................................130
port 80.......................................................144
rate limiting ...............................................179
TCP/UDP port numbers..................................... 139
TDT (Theoretical Departure Times) ....................446
Telnet...............................................................185
text conventions.................................................. 23
Theoretical Departure Times (TDT).................... 446
timeouts for real server connnections................... 134
TOS burst limit for bandwidth management.........453
transparent proxies..................136, 205, 208 to 213
tunable hashing..................................................184
tunneling...........................................................354
typographic conventions.......................................23
U
UDP.................................................171, 188, 189
datagrams.....................................................64
jumbo frame traffic fragmentation...................30
server status using....................................... 130
URL-based.............................................449 to 450
user account......................................................105
Using proxy IP
GSLB........................................................304
V
virtual clocks.....................................................446
virtual interface router (VIR).............................. 248
virtual IP address (VIP)..............................120, 122
virtual link, OSPF................................................79
Virtual Local Area Networks. See VLANs.
virtual port mapping to multiple real ports.139 to 142
virtual router
ID numbering.............................................280
virtual router group............................................ 257
Virtual Router Redundancy Protocol
tracking......................................................261
virtual server router............................................259
virtual servers....................................................120
configuration example.................................126
IP address...........................................126, 297
virus attacks, preventing.....................................417