Index – ZyXEL Communications ZyXEL ZyAIR 100 User Manual
Page 523

ZyWALL 10~100 Series Internet Security Gateway
Index
M
Index
1
10/100 Mbps Ethernet WAN ........................... 1-2
A
Access Point............................................6-5, 24-7
Action for Matched Packets......................... 12-10
Active...........................................23-7, 23-9, 27-3
Address Assignment .................................3-8, 3-9
Allocated Budget ..................................23-8, 27-6
Application-level Firewalls............................ 11-1
Applications ..................................................... 1-8
AT command ...............................23-3, 23-4, 34-2
Attack Alert............................12-20, 12-21, 12-22
Attack Types .................................................. 11-6
Authen...................................................23-7, 27-6
Authentication..............................23-7, 27-5, 27-6
Authentication Protocol ................................. 27-5
Auto-crossover 10/100 Mbps Ethernet LAN ... 1-2
Auto-negotiating 10/100 Mbps Ethernet DMZ 1-2
Auto-negotiating 10/100 Mbps Ethernet LAN. 1-2
Auxiliary .......................................................... 1-2
B
Backup ..................................................20-9, 34-2
Backup WAN................................................... 1-2
Bandwidth Borrowing.................................... 18-8
Bandwidth Class ............................................ 18-1
Bandwidth Filter ................................. 18-2, 18-15
Bandwidth Management ......................... 1-3, 18-1
Bandwidth Management Statistics............... 18-16
Bandwidth Manager Class Configuration.... 18-14
Bandwidth Manager Class Setup ................. 18-12
Bandwidth Manager Monitor....................... 18-18
Bandwidth Manager Summary .................... 18-10
Blocking Time .................................. 12-21, 12-24
Borrow Bandwidth from Parent Class ......... 18-15
Broadband Access Security Gateway .............xxix
Brute-force Attack, ........................................ 11-6
Budget Management...................................... 35-4
BW Budget .................................................. 18-15
Bypass Triangle Route................................... 12-6
C
Cable Modem ............................................C, 11-2
Call Back Delay............................................. 23-6
Call Control ................................................... 35-3
Call History.................................................... 35-5
Call Scheduling....................................... 1-4, 38-1
Max Number of Schedule Sets .................. 38-1
PPPoE ........................................................ 38-3
Precedence ................................................. 38-1