ZyAIR Wireless Gateway Series User’s Guide

Fragmentation Threshold ................................

 

6-4

Frequency-Hopping Spread Spectrum...........D-2

FTP.......................

4-2, 5-2, 9-6, 13-1, 13-4, 30-3
Restrictions

...............................................

 

30-3

FTP File Transfer........................................

 

28-10

FTP Restrictions..................................

 

13-1, 28-4

FTP Server ..................................................

 

 

23-13

 

G

 

 

 

Gateway ........................................................

 

 

21-9

General Setup.................................

 

3-2, 4-1, 18-1

Global..............................................................

 

 

9-1

 

H

 

 

 

Hidden Menus...............................................

 

17-5

Hop Count...........................................

 

 

21-6, 21-9

Host.......................................................

 

 

4-6, 18-4

Host IDs ..........................................................

 

 

J-1

HTTP ..................................

9-6, 11-1, 11-3, 23-8

HyperTerminal program .....................

 

28-6, 28-9

 

I

 

 

 

IBSS..............See Independent Basic Service Set

ICMP echo ....................................................

 

 

11-5

IEEE 802.11...................................................

 

 

D-1

Deployment Issues .....................................

 

E-1

Security Flaws............................................

 

E-1

IEEE 802.1x............................................

 

 

E-1, 1-4

Advantages.................................................

 

 

E-1

IGMP ..............................................................

 

 

5-3

IGMP support................................................

 

 

21-6

Independent Basic Service Set ......D-2, 6-1, 16-7

Infrastructure Configuration...........................

 

D-2

Initialization ..................................................

 

 

17-2

Inside...............................................................

 

 

9-1

Inside Global Address.....................................

 

9-1

Inside Local Address.......................................

 

9-1

Internet access

...............................................

 

19-1

Internet Access....................1-5, 17-6, 20-1, 20-2

Internet Access Setup............................

 

A-2, 23-1

Internet Control Message Protocol (ICMP) ..11-5 IP Address.. 3-11, 3-12, 5-5, 9-6, 9-7, 16-4, 19-3,

21-9, 24-8, 27-4, 27-8

 

IP Addressing..................................................

J-1

IP Alias Setup................................................

19-5

IP Classes ........................................................

J-1

IP Filter .......................................................

24-10

Logic Flow ................................................

24-9

IP mask..........................................................

24-8

IP Multicast .....................................................

1-5

IP Packet .....................................................

24-11

IP Pool.....................................................5-4, 5-5

IP Pool Setup...................................................

5-2

IP Ports..........................................................

11-3

IP Spoofing .........................................11-4, 11-7

IP Static Route ..............................................

21-7

IP Static Route Setup ....................................

21-8

K

 

Key Fields For Configuring Rules ................

12-3

L

 

LAN IP Address................................15-8, 15-10

LAN Setup ......................................................

5-1

LAN to WAN Rules......................................

12-4

LAND .................................................

11-4, 11-5

Link type .......................................................

27-2

Local ...............................................................

9-1

Log and Trace ...............................................

27-5

Log Descriptions ............................................

O-1

Log Facility ...................................................

27-7

Logging Option .................................24-8, 24-12

Logs...............................................................

15-1

M

 

MAC Address

 

Cloning Recommendation.........................

18-5

MAC Address Filter Action ................7-8, 19-10
MAC Address Filtering.........................7-6, 19-9

Main Menu....................................................

17-5

Index

Q-3