ZyWALL 2 Series User’s Guide

N

Nailed-up Connection ....................................

26-4

Nailed-Up Connection ..........................

23-7, 26-5

NAT .... 3-4, 3-9, 5-1, 8-5, 8-6, 23-10, 26-8, 30-16

Application...........................................................

8-3

Applying NAT in the SMT Menus

....................

28-1

Configuring........................................................

28-3

Definitions ...........................................................

8-1

Examples............................................................

28-9

How NAT Works.................................................

8-2

Mapping Types ....................................................

8-3

NAT Unfriendly Application Programs ...........

28-15

Ordering Rules...................................................

28-6

What NAT does ...................................................

8-1

NAT Traversal .............................

18-1, 18-2, 18-3

NetBIOS commands ......................................

10-7

Network Address Translation ........................

25-2

Network Address Translation (NAT)......

1-5, 28-1

Network Management......................................

8-6

Network Topology With RADIUS Server

Example .......................................................

E-2

NNTP ...............................................................

8-6

Notice.................................................................

iii

O

 

Offline............................................................

22-4

One Minute High .........................................

11-23

One Minute Low ..........................................

11-23

One to One ..............................................

See NAT

One-Minute High .........................................

11-21

Online Registration .............................................

v

Outgoing Protocol Filters...............................

24-6

Outside .............................................................

8-1

P

 

Packet Filtering .....................................

1-3, 10-12

Packet Filtering Firewalls ..............................

10-1

Packing List Card..........................................

xxvii

PAP .......................................................

23-6, 26-5

Password 4-5, 21-2, 21-6, 31-1. See My Password

Period(hr)..............................................

23-7, 26-5

Ping..............................................................

32-11

Ping of Death .................................................

10-4

Point-to-Point Tunneling Protocol.....3-6, 8-6. See

PPTP. See PPTP

 

POP3..............................................

8-6, 10-3, 10-4

Port Configuration .......................................

11-13

Port Forwarding...............................................

1-5

PPP ................................................................

23-8

PPPoE .......................................

1-4, 3-2, 3-4, 25-4

PPPoE Encapsulation25-1, 25-4, 25-5, 26-1, 26-3,

26-5, 26-10

 

PPTP .........................

3-2, 3-4, 3-6, 8-6, 25-3, H-1

Client ........................................................

25-3, 25-4

Configuring a Client .................................

25-3, 25-4

PPTP Encapsulation................

1-4, 3-6, 25-3, 26-6

Private.................................

9-4, 23-10, 26-8, 27-2

Private IP Address ....................................

3-8, 6-2

Protocol Filters...............................................

24-6

Incoming.............................................................

24-6

Outgoing .............................................................

24-6

Protocol/Port.........................................

19-7, 19-9

Q

Quick Start Guide ............................................

2-1

R

RADIUS ..........................................................

7-7

Shared Secret Key.................................................

7-8

RADIUS Message Types.................................

7-7

Related Documentation..................................

xxvii

Rem IP Address ..............................................

23-9

Rem Node Name..........................

23-6, 23-8, 26-2

Remote Management .....................................

35-1

Remote Management and NAT .....................

17-2

Remote Management Limitations.........

17-2, 35-3

Remote Node .................................................

26-1

Profile (Traffic Redirect Field) .........................

26-11

Remote Node Filter.............................

23-12, 26-9

Repairs.................................................................

v

Index

Q-5