Prestige 202H User’s Guide

Customer Support ............................................... vi

 

 

D

data compression..............................................

1-4

Data Filtering...................................................

18-1

Data Link Connection ........................................

5-3

DDNS

 

 

Configuration .......................................................

4-3

Default Dial-In Setup

 

..................................10-1

Default Policy Log ...........................................

15-5

Denial of Service .................

12-2, 12-3, 13-1, 14-8

Denial of Services

 

 

Thresholds........................................................

14-10

Destination Address .............................

15-3, 15-11

Device Filter rules .........................................

18-16

DHCP ........................................

4-2, 6-2, 6-4, 20-5

DHCP (Dynamic Host Configuration Protocol) ..1-4

DHCP Setup......................................................

6-5

Diagnostic .....................................................

20-12

Diagnostic Tools..............................................

20-1

dial-in user.......................................................

10-1

Dial-in User .....................................................

10-4

Dial-On-Demand ...............................................

1-3

Disclaimer ............................................................

ii

DNS.............................

See Domain Name System

Domain Name ...............................................

11-13

Domain Name System ......................................

6-4

DoS

 

 

Basics .................................................................

12-3

Types..................................................................

12-4

DoS (Denial of Service)

.....................................1-1

DSS-1................................................................

5-2

Dynamic DNS....................................................

4-2

DYNDNS Wildcard ............................................

4-2

 

E

e.g. ..................................

See Syntax Conventions

E-mail

 

Log Example ......................................................

14-6

Mail Server.........................................................

14-5

Mail Subject .......................................................

14-5

Tab .....................................................................

14-4

EMAIL ...............................................................

4-3

E-mail Address..................................................

4-3

E-mail Alerts....................................................

14-5

Enable Wildcard................................................

4-3

Encapsulation ...................................................

8-8

Enter ...............................

See Syntax Conventions

Entering Information..........................................

3-2

Error Log .........................................................

20-5

Error/Information Messages

 

Sample ...............................................................

20-6

Ethernet ............................................................

6-1

Ethernet Encapsulation.................................

11-12

Ethernet Traffic .............................................

18-20

European (DSS1) ISDN Setup Menus

..............5-2

F

Factory Ethernet Defaults

.................................6-2

FCC .....................................................................

iii

Features............................................................

1-1

Filename Conventions ....................................

21-1

Filter

 

Applying Filters ...........................................

18-19

Default Dial-in Filter..........................................

10-4

Ethernet Setup......................................................

6-1

Ethernet traffic .................................................

18-20

Ethernet Traffic ............................................

18-20

Filter Rules.......................................................

18-7

Filter Structure ...................................................

18-4

Generic Filter Rule ......................................

18-14

Remote Node Filter............................................

8-14

Remote Node Filters....................................

18-20

Sample .............................................................

18-18

SUA .................................................................

18-16

TCP/IP Filter Rule ..........................................

18-9

Filter Log.........................................................

20-7

Filter Rule Process..........................................

18-3

Filter Rule Setup .............................................

18-9

Filter Rules Summary

 

Sample .............................................................

18-19

Filter Set

 

Class...................................................................

18-9

Filtering ..................................................

18-1, 18-9

Filtering Process

 

Outgoing Packets ...............................................

18-2

Firewall .............................................................

1-1

Access Methods .................................................

13-1

H

Index