Prestige 650 Series User’s Guide

IP Protocol ..............................................................

39-4

IP Routing Policy (IPPR)........................................

39-1

Benefits......................................................

39-1

Cost Savings..............................................

39-1

Criteria.......................................................

39-1

Load Sharing .............................................

39-1

Setup..........................................................

39-2

IP Routing Policy Setup..........................................

39-3

IP Spoofing....................................................

10-4, 10-7

IP Static Route........................................................

28-1

IP Static Route Setup ..............................................

28-2

IPSec standard ..........................................................

1-4

IPSec VPN Capability ..............................................

1-4

ISDN........................................................................

G-2

K

 

Key Fields For Configuring Rules..........................

12-2

L

 

LAN........................................................................

35-3

LAN Setup.........................................................

4-1, 6-1

LAN TCP/IP.............................................................

4-2

LAN to WAN Rules ...............................................

12-3

LAND............................................................

10-4, 10-6

Link type.................................................................

35-2

LLC-based Multiplexing.......................................

27-13

Local Network

 

Rule Summary...........................................

12-7

Log and Trace.........................................................

35-5

Log Descriptions......................................................

H-1

Log Facility ............................................................

35-7

Logging Option..........................................

31-12, 31-15

Login ......................................................................

27-4

Logs ........................................................................

19-1

M

 

MAC address ..........................................................

29-4

MAC Address Filter ...............................................

25-3

MAC Address Filter Action.............................

5-9, 25-4

MAC Address Filtering ............................................

5-7

Main Menu .............................................................

22-4

Management Information Base (MIB)....................

33-2

Maximize Bandwidth Usage........................

20-4, 20-11

Max-incomplete High.............................................

11-4

Max-incomplete Low .............................................

11-4

MBS ......................................

See Maximum Burst Size

Media Access Control ............................................

29-1

Message Logging ...................................................

35-5

Metric ...................................................

27-5, 27-8, 28-3

Multicast..........................................................

4-3, 27-8

Multiplexing

 

 

LLC-based....................................................

3-2

VC-based......................................................

3-2

Multiplexing ...................................

1-6, 3-2, 26-6, 27-2

Multiprotocol Encapsulation ....................................

3-2

My WAN Address..................................................

27-7

N

 

 

Nailed-Up Connection..............................................

3-6

NAT.................................................

3-4, 7-5, 7-7, 31-16

Application...................................................

7-2

Applying NAT in the SMT Menus.............

30-1

Configuring ................................................

30-3

Definitions....................................................

7-1

Examples..................................................

30-11

How NAT Works .........................................

7-2

Mapping Types ............................................

7-3

Non NAT Friendly Application Programs30-17

Ordering Rules ...........................................

30-6

Server Sets....................................................

7-5

What NAT does............................................

7-1

NAT Traversal........................................................

18-1

NetBIOS commands...............................................

10-7

Network Address Translation.................................

26-7

Network Address Translation (NAT) .....................

30-1

Network Management .......................................

1-6, 7-6

NNTP .......................................................................

7-6

O

 

 

One-Minute High ...................................................

11-4

P

 

 

Packet

 

 

Error ...........................................................

35-2

Received.....................................................

35-3

Transmitted ................................................

35-3

Packet Filtering.....................................................

10-12

J-4

Index