Nortel Networks WEB OS 212777 User Manual
Page 481

Web OS 10.0 Application Guide
Index
n
481
212777-A, February 2002
service ports
.............................................. 128, 171
setting multiple response count
........................... 432
shared services
.................................................. 118
SIP (source IP address for filtering)
..................... 178
smask
source mask for filtering
.............................. 178
SMTP
.............................................................. 304
SNMP
................................................................ 74
Spanning-Tree Protocol
eliminating bridge loops with VRRP
............. 279
multiple instances
......................................... 51
replacing with hot-standby failover
............... 275
VLANs
................................................. 48, 49
spoofing, prevention of
........................................ 99
sport (filtering option)
................................ 186, 209
SSH
RSA host and server keys
............................ 109
SSH/SCP
configuring
................................................ 111
supported client commands
.......................... 112
stateful failover
................................................. 283
static NAT
........................................................ 191
static session entries
........................................... 158
statistical load distribution
.................................... 66
STP bridge PDUs
................................................ 48
streaming media
................................................ 155
summarizing routes
............................................. 77
switch failover
.................................................. 253
switch management
security
........................................................ 99
via IP interface
............................................. 45
switch ports VLANs membership
......................... 44
syslog
messages
................................................... 170
T
tagging. See VLANs tagging.
TCP
................................................. 171, 188, 189
health checking using
.................................. 130
port 80
....................................................... 144
rate limiting
............................................... 179
TCP/UDP port numbers
..................................... 139
TDT (Theoretical Departure Times)
.................... 446
Telnet
............................................................... 185
text conventions
.................................................. 23
Theoretical Departure Times (TDT)
.................... 446
timeouts for real server connnections
................... 134
TOS burst limit for bandwidth management
......... 453
transparent proxies
.................. 136, 205, 208 to 213
tunable hashing
.................................................. 184
tunneling
........................................................... 354
typographic conventions
....................................... 23
U
UDP
................................................. 171, 188, 189
datagrams
..................................................... 64
jumbo frame traffic fragmentation
................... 30
server status using
....................................... 130
URL-based
.............................................449 to 450
user account
...................................................... 105
Using proxy IP
GSLB
........................................................ 304
V
virtual clocks
..................................................... 446
virtual interface router (VIR)
.............................. 248
virtual IP address (VIP)
.............................. 120, 122
virtual link, OSPF
................................................ 79
Virtual Local Area Networks. See VLANs.
virtual port mapping to multiple real ports
. 139 to 142
virtual router
ID numbering
............................................. 280
virtual router group
............................................ 257
Virtual Router Redundancy Protocol
tracking
...................................................... 261
virtual server router
............................................ 259
virtual servers
.................................................... 120
configuration example
................................. 126
IP address
........................................... 126, 297
virus attacks, preventing
..................................... 417