ZyAIR Wireless Gateway Series User’s Guide

DMZ Setup .....................................................

8-1

DNS ...................................................

 

13-10, 19-3

Domain Name.......................

3-3, 3-12, 9-6, 23-8
DoS

 

 

 

Basics

........................................................

11-3

Types

........................................................

11-4

DoS (Denial of Service).......................1-4, 24-17

DS ..................................

See Distribution System

DSSS........

See Direct Sequence Spread Spectrum
Dynamic DNS................1-4, 4-2, 4-3, 18-1, 18-3

Dynamic WEP Key Exchange........................

7-8

DYNDNS Wildcard...............................4-3, 18-1

 

 

E

 

EAP..........................................................

 

1-4, 7-1

EAP Authentication ........................................

F-1

MD5............................................................

 

F-1

TLS .............................................................

 

F-1

TTLS...........................................................

 

F-1

ECHO .............................................................

 

9-6

Enable Wildcard ...........................................

18-4

Encapsulation..............................

20-1, 20-2, 21-1

PPP over Ethernet ......................................

H-1

Encryption ......................................................

7-9

Error Log ......................................................

27-5

Error/Information Messages

 

Sample ......................................................

27-6

ESS ......

See Extended Service Set. See Extended
Service Set

 

 

ESS ID ............................................................

 

3-1

Ethernet....................................................

 

3-5, 3-9

Ethernet Encapsulation .................................

23-7

Ethernet Traffic...........................................

24-16

Extended Service Set ..............................

D-3, 6-2

Extended Service Set IDentification...............

6-7

 

 

F

 

Factory LAN Defaults ....................................

5-2

FCC...................................................................

 

iii

FHSS..See Frequency-Hopping Spread Spectrum

Filename Conventions ..................................

28-1

Filter..............................................................

19-1

Applying Filters ......................................

24-15

Ethernet traffic ........................................

24-16

Ethernet Traffic.......................................

24-16

Filter Rules................................................

24-5

Filter Structure ..........................................

24-3

Generic Filter Rule..................................

24-11

Remote Node ............................................

21-6

Remote Node Filter...................................

21-6

Remote Node Filters ...............................

24-16

Sample ....................................................

24-14

SUA ........................................................

24-12

TCP/IP Filter Rule ....................................

24-6

Filter Log ......................................................

27-7

Filter Rule Process ........................................

24-2

Filter Rule Setup ...........................................

24-6

Filter Rules Summary

 

Sample ....................................................

24-15

Filter Set

 

Class..........................................................

24-6

Filter Set Configuration ................................

24-3

Filtering................................................24-1, 24-6

Finger..............................................................

9-6

Firewall ...........................................................

1-4

Access Methods ........................................

12-1

Connection Direction................................

12-4

Creating/Editing Rules............................

12-11

Enabling....................................................

12-1

Introduction...............................................

11-2

LAN to WAN Rules..................................

12-4

Policies......................................................

12-1

Rule Checklist...........................................

12-2

Rule Logic.................................................

12-2

Rule Security Ramifications .....................

12-2

Services...................................................

12-13

Types.........................................................

11-1

Firewall Application .....................................

11-3

Firmware File

 

Maintenance...................................16-8,16-10

Fragment Threshold......................................

19-7

Q-2

Index