IP rules 8-7
IPX rules 8-16–8-18 LAN port 10-29 Location 10-22 Login user 10-59 Network dial in user 10-64 Overview 3-8 Permit/Deny 8-7 PTRACE filter 9-9 RADIUS user F-5
Rule number 8-6, 8-7 Rule type 8-6
SAP rules 8-18 Saving 8-19
TCP parameters 8-10 Types of filters 8-2 UDP parameters 8-10 User login port 10-41 Uses of 8-2 Viewing 8-20
PAP authentication 6-9, 10-7 Parity
Host override 10-48 Network dial in user 5-1 S-Port parameter 10-48
Pass-thru login (SECURITY) 4-4, 4-13, 4-14, 4-15, 10-39
Password
Login user 4-9, 10-57
Network dial in user 5-7, 6-22, 6-26, 6-28, 6-30, 10-57
RADIUS user F-3, F-4, 10-10 Supervisor 2-3, 2-11
PING command 6-29, 8-15 Port configuration
Databits 10-47
Extended parameters 10-34 Flow control 10-48
for Modem sharing 7-1–7-5 Help 10-31
Host override 10-48 LAN-to-LAN routing 6-12–6-13 Modem control 10-48 Network dial in 5-4–5-6 Overview 3-10
Parity 10-48
Port type 3-9, 4-4, 5-4, 6-12, 6-26, 6-27, 7-1
Saving 4-8, 10-31 Sending AT commands 7-9 Speed 10-47
Stopbits 10-47
User login port 4-4–4-8 Viewing a port 10-34
Port default
Host 4-3, 4-5, 4-9, 4-13, 10-41, 10-60 Login service 4-6, 10-42
Terminal type 4-7, 4-13, 4-15, 10-43 Port type 3-9, 4-4, 5-4, 5-15, 6-12, 6-26, 6-
27, 7-1, 10-35–10-38 PortMux 9-3
Device service 7-4
Login port service 4-6, 10-42 Login user service F-7, 4-10, 10-60 Overview 4-2
PPP
Active interfaces 9-6 Authentication 6-9–6-11, 6-22, 6-30 Compression 5-10, 6-17, 6-24, 10-18 Location configuration 6-15, 6-16, 6-
17, 10-17, 10-18, 10-21
MTU 5-9, 6-16, 6-23, 10-21, 10-45, 10- 64
Negotiated addresses 5-8, 6-15 Overview 1-6
Port configuration 3-9, 10-35, 10-37, 10- 45, 10-46
User configuration 3-2, 5-1, 5-9, 5-10, 6- 23, 6-24, 10-57, 10-64
PPPasync map Hardwired port 10-45 Location 10-21 Network dial in user 10-63
Prompt, custom 4-7, 4-15, 5-5, 9-1, 10-39 Prompt users for a host 4-5, 4-9, 10-60 Proxy ARP 10-7
Pseudo TTY modem sharing 1-6, 7-4
R
RADIUS
Accounting server F-12–F-14, 1-2, 10-11 Alternate security server F-10, 10-10 CHAP authentication in F-11 Configuring the NETServer to use F-
10, 4-4, 4-13, 10-39 Encryption key F-2, F-10, 10-10 Host device dial out ports 7-3 Obtaining F-1
Outbound user F-10, 7-3 Overview 3-6
Primary security server F-10, 10-10 Security server F-2–F-11
User types F-8 Randomize hosts 1-3, 10-4
Read community name (SNMP) 10-55 Read hosts (SNMP) 10-56 REBOOT command 2-10, 3-4 Repairs, obtaining vi