P312 Broadband Security Gateway

Index CC

Index

A

Action for Matched Packets..........................16-10
Activate The Firewall...................................... 19-2
ActiveX........................................................... 20-1
Add Keyword.................................................. 20-3
Alert Schedule................................................ 15-5
Application-level Firewalls.............................. 13-1
AT command.................................................. 10-1
Attack
Reasons.............................................................. 18-2
Attack Alert................................. 15-7, 15-9, 15-10
Attack Types...................................................14-3
Reason................................................................14-5
Authentication............................................4-3, 4-4

B

BackOrifice..........................................................R
backup............................................................ 10-2
Big Picture
Filtering, Firewall and NAT...............................14-5
Block Web URLs............................................ 20-3
Blocking Time.............................15-8, 15-9, 15-11
Blocking URLs................................................ 20-2
Boot commands..............................................11-7
Broadband Security Gateway............i, ii, xxvii, 1-1
Brute Force Hacking............................................R
Budget Management............................. 11-2, 11-3

C

Cable Modem...................................2-2, 2-3, 13-2
Call Control.....................................................11-2
Call History............................................ 11-3, 11-4
Call-Trigerring Packet.....................................9-10
CDR..................................................................9-7
CHAP............................................................... 4-4
CLI Commands....................................................K
COM (Component Object Model)................... 20-1
Command Interpreter Mode........................... 11-1
Configuring A POP Custom Port.................... 19-8
Configuring A Rule..........................................19-5
console port.......................................................2-3
Console Port................................... 2-3, 9-4, 9-5, I
Content Filtering..............................................20-1
Cookies...........................................................20-2
Custom Ports
Creating/Editing..................................................17-2
Introduction........................................................17-1
Customer Support..............................................viii
Customized Services.......................................17-2

D

DDNS
Configuration........................................................2-9
Default Permit Log..........................................16-7
Denial of Service................. 13-2, 13-3, 14-1, 15-8
Denial of Services
Thresholds........................................................15-10
DestAdd........................................................19-10
Destination Address.............................. 16-2, 16-9
DHCP................................................................3-3
DHCP (Dynamic Host Configuration Protocol)1-2,
3-3
DHCP Negotiation.........................................19-11
Diagnostic.......................................................9-10
DNS...........................................................3-3, 3-6
Domain Name....................... 3-3, 6-13, 9-3, 9-5, T
DoS
Basics..................................................................13-3
Types..................................................................13-4
DoS (Denial of Service).....................................1-1
Dynamic DNS............................................2-8, 2-9
DYNDNS Wildcard............................................2-8

E

EG 2 - Internet Rule Summary......................19-11
EG 2 - Local Network Rule Summary............19-10
EG3 - Rule Summary....................................19-14
E-Mail Alerts....................................................15-5
E-Mail Screen..................................................19-3
E-Mail tab........................................................15-4