Prestige 652 ADSL Security Router

Media Access Control......................................

7-1

Message Logging...........................................

18-5

Metric...............................................

5-8, 6-6, 6-10

Multicast ...................................................

5-8, 6-6

Multiplexing

 

 

LLC-based.................................................

4-11

VC-based...................................................

4-11

Multiplexing ...........................

1-5, 4-11, 4-16, 5-2

Multiprotocol Encapsulation..........................

4-12

My WAN Address ....................................

5-7, 6-5

N

 

 

Nailed-Up Connection .....................................

5-3

NAT.............................................................

16-16

Application ..................................................

8-3

Applying NAT in the SMT Menus

.............. 8-6

Configuring .................................................

8-8

Definitions...................................................

8-1

Examples ...................................................

8-20

How NAT Works ........................................

8-2

Mapping Types............................................

8-4

Non NAT Friendly Application Programs 8-28,

8-29

 

 

Ordering Rules ..........................................

8-13

What NAT does...........................................

8-2

NetBIOS commands ........................................

9-6

Network Address Translation (NAT)

..... 8-1, 21-1

Network Management .....................................

1-5

O

 

One Minute High............................................

11-9

One Minute Low ............................................

11-9

One-Minute High ...........................................

11-7

P

 

Packet

 

Error ...........................................................

18-2

Received.....................................................

18-3

Transmitted ................................................

18-3

Packet Filtering...............................................

9-13

Packet Filtering Firewalls.................................

9-1

Packet Information .........................................

14-2

Packet Triggered.............................................

18-7

Packets............................................................

18-2

PAP...................................................................

5-5

Password.................................

2-7, 2-13, 5-5, 17-2

Ping.................................................................

18-9

Ping of Death....................................................

9-4

Point-to-Point ................................................

xxvii

policy-based routing .......................................

22-1

POP3.........................................................

9-3, 9-4

Port Configuration..........................................

13-4

POTS ................................................................

2-4

POTS Splitter ...................................................

2-5

PPP ...................................................................

5-2

PPPoA Encapsulation.......................................

6-2

PPP Log................................................

18-7, 18-8

HH

Index