Index

backbone (BR) 394

backup designated (BDR) 394 designated (DR) 394 internal (IR) 393

link state advertisements priority 394

types of 393

other documentation 3

OTP (One-Time Password) 750 outgoing bandwidth 317 oversize

chunk-encoding attack 640 len attack 641

offset attack 641 request-uri-directory attack 640

P

P1 33

P2P (Peer-to-peer) 600 attacks 600

see also Peer-to-peer

packet flow 96

inspection signatures 593, 597 scan 574, 989

statistics 236 statistics graph 238

packet capture 886 example 889 files 888 troubleshooting 912

packet captures downloading files 888

padding 608

Pairwise Master Key (PMK) 1029, 1031

PAP (Password Authentication Protocol) 356, 789 password 33

Password Authentication Protocol (PAP) 356, 789 payload

option 614 size 615

PCMCIA card installation 921 Peanut Hull 407 Peer-to-peer (P2P) 600

calls 161, 429 managing 547

Perfect Forward Secrecy (PFS) 476 Diffie-Hellman key group 503

performance troubleshooting 900, 901, 902

Personal Identification Number code, see PIN code

PFS (Perfect Forward Secrecy) 476, 503 phishing 654

physical ports 33 and interfaces 92 packet statistics 236 packet statistics graph 238

PIN code 316

PIN generator 750 pointer record 819

Point-to-Point Protocol over Ethernet, see PPPoE.

Point-to-Point Tunneling Protocol, see PPTP policy enforcement in IPSec 475

policy route

multiple WAN IP addresses 174 troubleshooting 897, 907

policy routes 98, 374 actions 376

and address objects 380 and ALG 429, 430, 433 and HTTP redirect 424 and interfaces 381 and NAT 374

and schedules 380, 561, 564, 567, 570 and services 738

and trunks 364, 381

and user groups 379, 380, 561, 564, 567, 570 and users 379, 380, 561, 564, 567, 570

and VoIP pass through 429, 430 and VPN connections 381, 904 bandwidth management 383 benefits 374

BWM 377

configuration overview 101 criteria 376

L2TP VPN 544

overriding direct routes 377 prerequisites 102

polymorphic virus 587

POP

 

1111

ZyWALL USG 300 User’s Guide