ZyWALL 2 and ZyWALL 2WE

1

 

 

10/100 Mbps Ethernet WAN

...........................

1-1

4

 

 

4-Port Switch ...................................................

1-1

A

 

 

Access Point...................................................

7-12

Action for Matched Packets.........................

16-12

Active.............................................................

10-2

Ad-hoc Configuration .......................................

21

Allocated Budget ...........................................

10-5

Alternative Subnet Mask Notation....................

47

Antenna............................................................

2-5

Directional.....................................................

15

Omni-directional ...........................................

14

Types.............................................................

14

Antenna gain .....................................................

14

Application-level Firewalls............................

13-1

Applications .....................................................

1-5

AT command .................................................

22-2

Attack Alert..................................

15-3, 15-4, 15-5

Attack Types ..................................................

13-6

Authen............................................................

10-5

Authentication.......................................

10-4, 10-5

Authentication Protocol .................................

10-4

 

Index

Auto-negotiating 10/100 Mbps Ethernet LAN 1-1

Auto-sensing 10/100 Mbps Ethernet LAN

...... 1-1

Auxiliary..........................................................

1-2

 

B

 

Backup...........................................................

22-2

Basic Service Set ...............................................

21

Big Picture .........................................................

19

Blocking Time ......................................

15-4, 15-7

Bold Times font ..............

See Syntax Conventions

Boot commands .................................................

68

Broadband Access Security Gateway ........

i, xxvii

Brute-force Attack, ........................................ 13-6

BSS .....................................

See Basic Service Set

Budget Management.............................

23-2, 23-3

Bypass Triangle Route...................................

16-6

 

C

 

Cable Modem ..................................

2-3, 2-4, 13-2

Call Control ...................................................

23-2

Call History....................................................

23-4

Call Scheduling.......................................

1-3, 25-1

maximum number of schedule sets............

25-1

PPPoE ........................................................

25-3

Precedence .................................................

25-1

Call-Trigerring Packet .................................

21-10

Index

A