ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual
Page 612

ZyWALL 2 Series User’s Guide
Q-6 Index
Replacement ........................................................v 
Reports........................................................... 19-6 
Required fields............................................... 21-3 
Reset Button .................................................... 1-2 
Resetting the Time......................................... 34-7 
Restore........................................................... 20-9 
Restore Configuration.................................... 33-8 
retry count...................................................... 23-5 
retry interval .................................................. 23-5 
Return Material Authorization Number...............v 
RF signals ........................................................D-1 
RIP..................... 5-2, 5-3, 23-10, 24-4, 24-6, 26-8 
Direction............................................................. 24-6 
Version ......................................................24-6, 26-8 
RoadRunner Support ....................................... 1-6 
Route.............................................................. 26-3 
RTS Threshold................................................. 7-1 
RTS/CTS handshake............................... 7-5, 
24-7
Rule Summary ............................................. 11-17 
Rules ..................................................... 11-1, 11-4 
Checklist............................................................. 11-2 
Creating Custom................................................. 11-1 
Key Fields .......................................................... 11-3 
LAN to WAN..................................................... 11-4 
Logic .................................................................. 11-2 
Predefined Services .......................................... 11-18 
Source and Destination Addresses ................... 11-11 
S
SA Monitor .................................................... 38-1 
Safety Instructions ............................................J-1 
Saving the State ............................................. 10-7 
Schedule Sets 
Duration ............................................................. 36-2
Schedules ....................................................... 26-5 
Security Association ...................................... 38-1 
Security Ramifications................................... 11-2 
Select .............................. See Syntax Conventions 
Server4-9, 8-4, 25-2, 26-3, 28-3, 28-5, 28-8, 28-9, 
28-11, 28-12, 34-7
Server IP ........................................................ 26-3 
Service ....................................................... v, 11-3 
Service Name .................................................26-2 
Service Set........................................................7-5 
Service Type...................... 11-13, 25-2, 26-2, A-2 
Services ............................................................8-5 
Set Up a Schedule...........................................36-2 
SMT...... 21-2. See System Management Terminal 
SMT Menus at a Glance .................................21-4 
SMTP ...............................................................8-5 
Smurf..............................................................10-6 
SNMP ............................................ 1-5, 8-6, 17-22 
Community ........................................................ 31-1 
Configuration ..................................................... 31-1 
Get.................................................................... 17-24 
Manager ........................................................... 17-23 
MIBs ................................................................ 17-24 
Trap.................................................................. 17-24 
Trusted Host....................................................... 31-1 
SNMP ( Simple Network Management Protocol)
......................................................................1-5
Source & Destination Addresses ..................11-11 
Source Address................................... 11-3, 11-10 
Stateful Inspection.......1-3, 10-1, 10-2, 10-7, 10-8 
Process ............................................................... 10-8 
ZyWALL ........................................................... 10-9 
Static Route ......................................................9-1 
SUA................................................... 8-5, 8-6, 8-7 
SUA (Single User Account) ...See NAT. See NAT 
SUA Only............................................... See NAT 
Subnet Mask3-9, 5-1, 11-12, 23-9, 24-4, 25-2, 26-
7, 27-2
Subnet Masks ................................................... I-2 
Subnetting......................................................... I-2 
Support Disk..................................................xxvii 
SYN Flood............................................ 10-4, 10-5 
SYN-ACK ......................................................10-5 
Syntax Conventions.......................................xxvii 
Syslog ...........................................................11-13 
Syslog IP Address ..........................................32-6 
System Information ..................... 32-1, 32-3, 32-4 
System Maintenance.19-2, 32-1, 32-2, 32-3, 32-4, 
32-5, 32-6, 32-10, 32-11, 33-2, 33-5, 33-13, 
33-15, 34-1, 34-3, 34-4, 34-6, 34-7 
