ZyWALL 2 Series User’s Guide

Replacement ........................................................

v

Reports...........................................................

19-6

Required fields...............................................

21-3

Reset Button ....................................................

1-2

Resetting the Time.........................................

34-7

Restore...........................................................

20-9

Restore Configuration....................................

33-8

retry count......................................................

23-5

retry interval ..................................................

23-5

Return Material Authorization Number...............

v

RF signals ........................................................

D-1

RIP.....................

5-2, 5-3, 23-10, 24-4, 24-6, 26-8

Direction.............................................................

24-6

Version ......................................................

24-6, 26-8

RoadRunner Support .......................................

1-6

Route..............................................................

26-3

RTS Threshold.................................................

7-1

RTS/CTS handshake...............................

7-5, 24-7

Rule Summary .............................................

11-17

Rules .....................................................

11-1, 11-4

Checklist.............................................................

11-2

Creating Custom.................................................

11-1

Key Fields ..........................................................

11-3

LAN to WAN.....................................................

11-4

Logic ..................................................................

11-2

Predefined Services ..........................................

11-18

Source and Destination Addresses ...................

11-11

 

S

SA Monitor ....................................................

38-1

Safety Instructions ............................................

J-1

Saving the State .............................................

10-7

Schedule Sets

 

Duration .............................................................

36-2

Schedules.......................................................

26-5

Security Association ......................................

38-1

Security Ramifications...................................

11-2

Select ..............................

See Syntax Conventions

Server4-9, 8-4, 25-2, 26-3, 28-3, 28-5, 28-8, 28-9,

28-11, 28-12, 34-7

 

Server IP ........................................................

26-3

Service .......................................................

v, 11-3

Service Name .................................................

 

26-2

Service Set........................................................

 

7-5

Service Type......................

11-13, 25-2, 26-2, A-2

Services ............................................................

 

 

8-5

Set Up a Schedule...........................................

 

36-2

SMT......

21-2. See System Management Terminal

SMT Menus at a Glance

.................................

21-4

SMTP ...............................................................

 

 

8-5

Smurf..............................................................

 

 

10-6

SNMP............................................

 

 

1-5, 8-6, 17-22

Community ........................................................

 

31-1

Configuration .....................................................

 

31-1

Get....................................................................

 

 

17-24

Manager ...........................................................

 

17-23

MIBs ................................................................

 

 

17-24

Trap..................................................................

 

 

17-24

Trusted Host.......................................................

 

31-1

SNMP ( Simple Network Management Protocol)

......................................................................

 

 

1-5

Source & Destination Addresses ..................

11-11

Source Address...................................

 

11-3, 11-10

Stateful Inspection.......

1-3, 10-1, 10-2, 10-7, 10-8

Process

...............................................................

 

10-8

ZyWALL ...........................................................

 

10-9

Static Route ......................................................

 

9-1

SUA...................................................

 

 

8-5, 8-6, 8-7

SUA (Single User Account) ...See NAT. See NAT

SUA Only...............................................

 

See NAT

Subnet Mask3-9, 5-1, 11-12, 23-9, 24-4, 25-2, 26-

7, 27-2

 

 

 

Subnet Masks ...................................................

 

I-2

Subnetting.........................................................

 

I-2

Support Disk..................................................

 

xxvii

SYN Flood............................................

 

10-4, 10-5

SYN-ACK ......................................................

 

10-5

Syntax Conventions.......................................

 

xxvii

Syslog ...........................................................

 

 

11-13

Syslog IP Address ..........................................

 

32-6

System Information .....................

 

32-1, 32-3, 32-4

System Maintenance.19-2, 32-1, 32-2, 32-3, 32-4, 32-5, 32-6, 32-10, 32-11, 33-2, 33-5, 33-13, 33-15, 34-1, 34-3, 34-4, 34-6, 34-7

Q-6

Index