Index

P

P2P (Peer-to-peer) 490 attacks 490

see also Peer-to-peer packet

flow 91

inspection signatures 483, 487 scan 464

statistics 170, 172

packet capture 750 example 753 files 752 troubleshooting 773

packet captures downloading files 752

padding 498

PAP (Password Authentication Protocol) 657 password 32

Password Authentication Protocol (PAP) 657 payload

option 504 size 505

Peanut Hull 315

Peer-to-peer (P2P) 490 calls 139, 337 managing 437

Perfect Forward Secrecy (PFS) 384 Diffie-Hellman key group 406

performance troubleshooting 763, 764, 765

Personal Identification Number code, see PIN code

PFS (Perfect Forward Secrecy) 384, 406 phishing 544

physical ports and interfaces 88

packet statistics 170, 172 PIN code 242

PIN generator 618 pointer record 685

Point-to-Point Protocol over Ethernet, see PPPoE.

Point-to-Point Tunneling Protocol, see PPTP policy enforcement in IPSec 383

policy route

troubleshooting 761, 770

policy routes 282 actions 284

and address objects 288 and ALG 337, 338, 341 and HTTP redirect 332 and interfaces 289 and NAT 282

and schedules 288, 451, 454, 457, 460 and service objects 606

and trunks 272, 289

and user groups 287, 288, 451, 454, 457, 460 and users 287, 288, 451, 454, 457, 460

and VoIP pass through 337, 338 and VPN connections 289, 767 bandwidth management 291 benefits 282

BWM 285

configuration overview 97 criteria 284

overriding direct routes 285 prerequisites 97

polymorphic virus 477

POP POP2 566 POP3 566

pop-up windows 43

port forwarding, see NAT port groups 109, 216, 219

port roles 218

and Ethernet interfaces 218 and physical ports 218

port scanning 525 port scan, filtered 526 port sweep 526

port translation, see NAT port triggering 294

and firewall 290, 765 and policy routes 290 and service groups 290 and services 290 troubleshooting 765

Post Office Protocol, see POP 566 power off 35, 757

power on 35

PPP270 troubleshooting 762

 

935

ZyWALL USG 50 User’s Guide