beautypg.com

ZyXEL Communications 5 Series User Manual

Page 48

background image

ZyWALL 5/35/70 Series User’s Guide

48

List of Tables

Table 125 Services and Port Numbers ............................................................................... 405

Table 126 ADVANCED > NAT > Port Forwarding .............................................................. 408

Table 127 ADVANCED > NAT > Port Triggering ................................................................ 410

Table 128 ADVANCED > STATIC ROUTE > IP Static Route ............................................. 414

Table 129 ADVANCED > STATIC ROUTE > IP Static Route > Edit ................................... 415

Table 130 ADVANCED > POLICY ROUTE > Policy Route Summary ............................... 419

Table 131 ADVANCED > POLICY ROUTE > Edit .............................................................. 420

Table 132 Application and Subnet-based Bandwidth Management Example .................... 425

Table 133 Maximize Bandwidth Usage Example ............................................................... 426

Table 134 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ....... 427

Table 135 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example .... 427

Table 136 Bandwidth Borrowing Example .......................................................................... 428

Table 137 Over Allotment of Bandwidth Example .............................................................. 429

Table 138 ADVANCED > BW MGMT > Summary ............................................................. 430

Table 139 ADVANCED > BW MGMT > Class Setup ......................................................... 432

Table 140 ADVANCED > BW MGMT > Class Setup > Add Sub-Class ............................. 434

Table 141 Services and Port Numbers ............................................................................... 436

Table 142 ADVANCED > DNS > Add (Address Record) ................................................... 443

Table 143 ADVANCED > REMOTE MGMT > WWW ......................................................... 454

Table 144 ADVANCED > REMOTE MGMT > SSH ............................................................ 462

Table 145 ADVANCED > REMOTE MGMT > Telnet .......................................................... 466

Table 146 ADVANCED > REMOTE MGMT > FTP ............................................................ 467

Table 147 SNMP Traps ...................................................................................................... 469

Table 148 ADVANCED > REMOTE MGMT > SNMP ......................................................... 470

Table 149 ADVANCED > REMOTE MGMT > DNS ............................................................ 471

Table 150 ADVANCED > REMOTE MGMT > CNM ........................................................... 472

Table 151 ADVANCED > UPnP ......................................................................................... 476

Table 152 ADVANCED > UPnP > Ports ............................................................................. 478

Table 153 ADVANCED > ALG ............................................................................................ 490

Table 154 REPORTS > SYSTEM REPORTS .................................................................... 492

Table 155 REPORTS > SYSTEM REPORTS: Web Site Hits Report ................................. 493

Table 156 REPORTS > SYSTEM REPORTS: Host IP Address ........................................ 494

Table 157 REPORTS > SYSTEM REPORTS: Protocol/ Port ............................................ 495

Table 158 Report Specifications ......................................................................................... 496

Table 159 REPORTS > THREAT REPORTS > IDP ........................................................... 497

Table 160 REPORTS > THREAT REPORTS > Anti-Virus ................................................. 499

Table 161 REPORTS > THREAT REPORTS > Anti-Spam ................................................ 500

Table 162 LOGS > View Log .............................................................................................. 504

Table 163 Log Description Example ................................................................................... 504

Table 164 LOGS > Log Settings ........................................................................................ 508

Table 165 System Maintenance Logs ................................................................................ 509

Table 166 System Error Logs ............................................................................................. 511

Table 167 Access Control Logs .......................................................................................... 511