ZyAIR Wireless Gateway Series User’s Guide

And FTP Over WAN} ..............................

30-3

Restrictions ...............................................

30-3

TFTP and FTP over WAN Will Not Work
When…..................................................... 28-4

TFTP and FTP Over WAN}.........................

13-1

TFTP File Transfer .....................................

28-12

TFTP Restrictions................................

13-1, 28-4

Three-Way Handshake .................................

11-4

Time and Date Setting ..................................

29-4

Time Zone.....................................................

29-6

TKIP ..........See Temporal Key Integrity Protocol

TLS .................................................................

F-1

Trace Records ...............................................

27-5

Traceroute.....................................................

11-7

Transport Layer Security ........................See TLS

Triangle..........................................................

N-1

Triangle Route\ Solutions ..............................

N-2
Trigger Port Forwarding

 

Process Example.....................................

23-16

Troubleshooting

 

Accessing ZyAIR...............................A-3, A-4

Ethernet Port ..............................................

A-2

Password....................................................

A-1

Start-Up .....................................................

A-1

TTLS...............................................................

F-1

Tunneled Transport Layer Service.......See TTLS

 

U

 

Universal Plug and Play (UPnP)..........14-1, 14-3
UNIX Syslog .......................................27-5, 27-7

UNIX syslog parameters...............................

27-7

Upload Firmware........................................

28-10

UPnP Examples ............................................

14-4

Use Server Detected IP.................................

18-4

User Authentication ........................................

7-9

User Name .............................................4-5, 18-4
User Profiles ........................................7-19, 22-1

User Specified IP Addr.................................

18-5

V

 

 

Valid CI Commands .....................................

29-1

VPN ................................................................

8-5

W

 

 

WAN Setup...................................................

3-13

WAN to LAN Rules .....................................

12-5

Web...............................................................

13-5

Web Configurator .................2-1, 2-4, 11-2, 12-3

Web Site Hits................................................

15-8

WEP................................................................

3-1

WEP Encryption ....................................

7-5, 19-8
Wireless Client WPA Supplicants

................7-12

Wireless LAN .......................................

D-1, 19-6

Benefits ......................................................

D-1

Wireless LAN Setup .....................................

19-6

Wizard Setup...........................3-1, 3-2, 3-5, 3-11
WLAN ....................................See Wireless LAN

WPA ...............................................................

7-9

WPA with RADIUS Application..................

7-10

WPA-PSK.......................................................

7-9

WPA-PSK Application ...................................

7-9

www.dyndns.org...........................................

18-4

X

 

 

XMODEM protocol......................................

28-2

Z

 

 

ZyNOS.................................................

28-1, 28-2

ZyNOS F/W Version ....................................

28-1

ZyXEL Limited Warranty

 

 

Note...............................................................

iv

ZyXEL’s Firewall

 

 

Introduction...............................................

11-2

Q-6

Index