P312 Broadband Security Gateway

Index EE

L
LAN Setup........................2-6, 2-11, 2-12, 3-4, 3-5
LAN to WAN Rules......................................... 16-3
LAND............................................13-4, 13-5, 14-2
Local Network
Rule Summary................................................... 16-6
log.....................................................................9-5
Log Facility....................................................... 9-7
Log Screen..................................................... 18-1
Login screen................................................... 15-1
M
MAC Address........................................ 2-11, 21-2
Mail Server...................................................... 15-5
Main Menu........................................................2-6
Maximum Incomplete High........................... 15-10
Maximum Incomplete Low............................15-10
max-incomplete high...................................... 15-8
max-incomplete low.............................15-8, 15-11
Metric..................................................4-6, 4-8, 5-3
My WAN Address............................................. 4-8
N
nailed-up connection........................................ 4-3
NAT.................................................. 4-6, 4-8, 7-16
Application...........................................................6-4
Applying NAT in the SMT Menus...................... 6-4
Configuring..........................................................6-6
Definitions........................................................... 6-1
Examples............................................................6-13
How NAT Works.................................................6-2
Mapping Types.................................................... 6-2
Multiple Servers.................................................6-11
Non NAT Friendly Application Programs.........6-19
Ordering Rules..................................................... 6-9
What NAT does................................................... 6-1
NetBIOS commands.......................................14-3
Network Address Translation (NAT).1-2, 6-1, 12-1
O
One Minute High...........................................15-10
One Minute Low........................................... 15-10
one-minute high..............................................15-8
P
Packet Filtering Firewalls................................13-1
Packet Information..........................................18-2
Packet Triggered...............................................9-7
Packing List Card........................................... xxviii
PAP...................................................................4-4
password...........................................................2-4
Password.................................................. 2-4, 2-7
Ping.................................................................9-12
Ping of Death..................................................13-4
Playboy...........................................................20-2
POP3.....................................................13-3, 13-4
Port Configuration...........................................17-4
Power Adapter..................................................2-3
PPP log.............................................................9-7
PPPoE Encapsulation3-8, 3-10, 4-1, 4-3, 4-4, 4-9,
4-10
PPTP Encapsulation................... 1-1, 3-9, 4-4, 4-7
Prestige Firewall Application...........................13-3
Prestige Web Configurator13-2, 13-8, 13-9, 14-2,
15-1, 15-2, 16-2, 19-1
Private.................................. 3-2, 4-7, 4-9, 5-3, AA
Private IP Addresses.........................................3-2
R
Read Me First.................................................xxviii
Rear Panel........................................................2-2
Related Documentation..................................xxviii
Remote Management Setup...........................11-6
remote node......................................................4-1
Remote Node Filter...........................................4-9
Required fields..................................................2-5
Resetting the Prestige.......................................2-7
Restore Configuration.....................................10-3
Restrict Web Features.....................................20-1
Return address................................................15-5
RIP.............................................. 3-2, 3-6, 4-7, 4-9
ROM File.........................................................10-4
Rule Checklist.................................................16-1
Rule Summary16-6, 16-7, 16-8, 19-3, 19-6, 19-8,
19-9, 19-10