ZyWALL 2 Series User’s Guide

System Management Terminal

...................... 21-2

System Name ..........................................

4-2, 22-1

System Status .................................................

32-1

System Timeout .............................................

17-2

T

TCP Maximum Incomplete....

11-21, 11-22, 11-24

TCP Security................................................

10-10

TCP/IP .10-3, 10-4, 17-19, 23-9, 24-2, 24-3, 24-4,

26-7, 30-6, 30-7, 30-9, 30-12, 30-16

Setup ..................................................................

24-4

TCP/IP and DHCP Setup ...............................

24-2

TCP/IP filter rule............................................

30-6

Teardrop.........................................................

10-4

Telnet ...........................................................

17-19

Telnet Configuration....................................

17-19

Terminal Emulation .......................................

21-1

TFTP ..............................................................

33-5

File Upload ......................................................

33-13

GUI-based Clients..............................................

33-6

TFTP and FTP over WAN .............................

33-5

TFTP and FTP over WAN Will Not Work When…...................................................... 33-5

TFTP and FTP Over WAN}

.................17-2, 35-3

TFTP Restrictions

........................

17-2, 33-5, 35-3

Three-Way Handshake...................................

10-5

Threshold Values .........................................

11-21

Time and Date..................................................

1-2

Time and Date Setting..................

34-5, 34-6, 34-7

Time Zone...............................................

4-7, 34-7

Timeout.....................

23-7, 23-8, 25-4, 25-5, 26-5

TLS ..................................................................

F-1

Trace ..............................................................

32-5

Traceroute ......................................................

10-7

Tracing .............................................................

1-6

Trademarks .........................................................

ii

Traffic Redirect..............................

1-5, 6-14, 6-15

Setup ................................................................

26-11

Transport Layer Security .........................

See TLS

Triangle...........................................................

C-1

Triangle Route\ Solutions ...............................

C-2

Trigger Port Forwarding ..............................

28-16

Process..............................................................

28-17

Trivial File Transfer Protocol ................

See TFTP

Troubleshooting...............................................

A-1

Internet Access.....................................................

A-3

LAN Interface......................................................

A-2

WAN Interface.....................................................

A-2

TTLS................................................................

F-1

Tunneled Transport Layer Service.........

See TTLS

U

UDP/ICMP Security ....................................

10-10

Universal Plug and Play...................................

1-4

Universal Plug and Play (UPnP)...........

18-1, 18-3

UNIX Syslog .................................................

32-6

Upload Firmware.........................................

33-11

UPnP................................................................

1-4

UPnP Examples .............................................

18-5

Upper Layer Protocols......................

10-10, 10-11

Use Server Detected IP..................................

22-4

User Name ..............................................

4-5, 22-3

User Profiles ...........................................

7-9, 16-1

User Specified IP Addr..................................

22-4

 

V

VPN ........................................................

6-7, 25-3

VT100............................................................

21-1

 

W

WAN DHCP .....................................

32-10, 32-11

WAN Setup....................................

3-10, 6-2, 23-1

WAN to LAN Rules ......................................

11-4

Warranty ..............................................................

v

Web Configurator 2-1, 2-3, 10-2, 10-11, 11-3, 29-

2

 

Web Site Hits........................................

19-7, 19-8

WEP Encryption ..............................................

7-5

Wireless LAN ..................................................

D-1

Benefits................................................................

D-1

Index

Q-7