beautypg.com

ZyXEL Communications 5 Series User Manual

Page 829

background image

ZyWALL 5/35/70 Series User’s Guide

Index

829

and certificates

329

and RADIUS

330

authentication algorithms

327, 333

Diffie-Hellman key group

328

encryption algorithms

327, 333

extended authentication

330

ID content

329

ID type

329

IP address, remote IPSec router

325

IP address, ZyXEL Device

325

local identity

329

main mode

324, 330

NAT traversal

331

negotiation mode

324

password

330

peer identity

329

pre-shared key

328

proposal

327

SA life time

332

user name

330

IKE SA. See also VPN.

IMAP

288

incoming protocol filter

579

Independent Basic Service Set. See IBSS.

initialization vector

767

installation, freestanding

723

installing fuses

727

Internet access setup

90, 581

Internet Assigned Number Authority. See IANA.

Internet Group Management Protocol. See (IGMP).

Internet Message Access Protocol. See IMAP.

Internet Protocol Security. See IPSec.

intrusions

firewalls

251

host

252

IDP

252

network

252

severity levels

259

IP address

assignment

582, 605

pool

131, 134, 181, 191, 577

private

130

IP alias

579

IP alias setup

579

DMZ

587

IP policy routing

417, 691

IP protocol type

237

IP routing policy

691

IP static route

609

active

610

destination IP address

610

name

610

route number

610

IPSec

323

IPSec SA

active protocol

340

authentication algorithms

327, 333

authentication key (manual keys)

348

encapsulation

341

encryption algorithms

327, 333

encryption key (manual keys)

348

local policy

340

manual keys

348

nail up

332

Perfect Forward Secrecy (PFS)

341

proposal

341

remote policy

340

SA life time

332

Security Parameter Index (SPI) (manual keys)

348

transport mode

341

tunnel mode

341

when IKE SA is disconnected

332, 340

IPSec SA. See also VPN.

IPSec. See also VPN.

ISP parameters

90

J

junk e-mail

285

L

labels, SMT

54

LAN

132

port

56

port filter setup

575

setup

575

legitimate e-mail

288

levels of severity of intrusions

259

license key

126

link type

76

load balancing

57

loading a configuration file

545

log

655

log and trace

655

log facility

656

login screen

550

M

MAC address

160, 564

filter

199, 217, 595