P312 Broadband Security Gateway

DD Index

Encapsulation
PPP over Ethernet....................................................E
Ethernet Encapsulation3-8, 4-1, 4-5, 4-6, 4-10, 6-
11, 6-12
Example E-Mail Log........................................15-6
Examples........................................................19-1
F
Factory Default................................................2-11
Filename Conventions.....................................10-1
Filter................................................. 2-12, 4-9, 7-1
About....................................................................7-1
Applying.............................................................7-17
Configuring..........................................................7-4
Example..............................................................7-14
Filter log...............................................................9-7
Generic Filter Rule.............................................7-12
NAT................................................................... 7-16
Structure...............................................................7-2
Filters
Executing a Filter Rule.........................................7-2
Logic Flow of an IP Filter..................................7-10
Firewall
Address Type....................................................16-11
Alerts..................................................................15-3
Connection Direction......................................... 16-3
Creating/Editing Rules.......................................16-8
E-Mail................................................................ 15-3
Guidelines For Enhancing Security....................13-9
Logs....................................................................15-4
Policies...............................................................16-1
Rule Logic..........................................................16-1
Rule Precedence................................................. 16-6
Services.............................................................. 16-4
SMT Log............................................................14-2
SMT Menus........................................................14-1
Types..................................................................13-1
Vs Filters............................................................14-6
Web Configurator...............................................15-1
When To Use......................................................14-7
Flow Control......................................................2-4
Front Panel LEDs..............................................2-1
FTP File Transfer............................................10-7
FTP Server.............................................. 1-3, 6-17
G
General Setup...................................................2-8
H
Half-Open Sessions........................................15-8
Hidden Menus...................................................2-5
Housing.............................................................2-4
HTTP....................6-13, 13-1, 13-3, 13-4, U, X, AA
I
IANA.......................................................... 3-1, 3-2
ICMP echo.............................................13-5, 14-3
idle timeout....................................................... 4-3
IGMP (Internet Group Multicast Protocol).........3-3
Initial Screen.....................................................2-4
Installation Requirements................................. 2-3
Internet access..................................................3-1
Internet Access Setup........2-6, 3-8, 3-9, 6-4, 21-2
Internet Assigned Numbers Authority.... See IANA
Internet Control Message Protocol (ICMP)13-5,
14-3
IP address..................................................3-1, 3-6
IP Address Assignment.............................4-6, 4-8
IP Alias Setup................................................... 3-7
IP Multicast................................................1-2, 3-3
Internet Group Management Protocol (IGMP)....1-2
IP Network Number...........................................3-1
IP Pool.............................................................. 3-3
IP Ports...........................................................13-4
IP Spoofing.............................. 13-4, 13-6, 14-2, Z
IP Static Route....................................5-1, 5-2, 5-3
J
Java................................................................ 20-1
Java VM..........................................................20-1
K
Key Fields For Configuring Rules...................16-2
Keyword..........................................................20-2