beautypg.com

Index – ZyXEL Communications ZyXEL ZyAIR 100 User Manual

Page 523

background image

ZyWALL 10~100 Series Internet Security Gateway

Index

M

Index

1

10/100 Mbps Ethernet WAN ........................... 1-2

A

Access Point............................................6-5, 24-7

Action for Matched Packets......................... 12-10

Active...........................................23-7, 23-9, 27-3

Address Assignment .................................3-8, 3-9

Allocated Budget ..................................23-8, 27-6

Application-level Firewalls............................ 11-1

Applications ..................................................... 1-8

AT command ...............................23-3, 23-4, 34-2

Attack Alert............................12-20, 12-21, 12-22

Attack Types .................................................. 11-6

Authen...................................................23-7, 27-6

Authentication..............................23-7, 27-5, 27-6

Authentication Protocol ................................. 27-5

Auto-crossover 10/100 Mbps Ethernet LAN ... 1-2

Auto-negotiating 10/100 Mbps Ethernet DMZ 1-2

Auto-negotiating 10/100 Mbps Ethernet LAN. 1-2

Auxiliary .......................................................... 1-2

B

Backup ..................................................20-9, 34-2

Backup WAN................................................... 1-2

Bandwidth Borrowing.................................... 18-8

Bandwidth Class ............................................ 18-1

Bandwidth Filter ................................. 18-2, 18-15

Bandwidth Management ......................... 1-3, 18-1

Bandwidth Management Statistics............... 18-16

Bandwidth Manager Class Configuration.... 18-14

Bandwidth Manager Class Setup ................. 18-12

Bandwidth Manager Monitor....................... 18-18

Bandwidth Manager Summary .................... 18-10

Blocking Time .................................. 12-21, 12-24

Borrow Bandwidth from Parent Class ......... 18-15

Broadband Access Security Gateway .............xxix

Brute-force Attack, ........................................ 11-6

Budget Management...................................... 35-4

BW Budget .................................................. 18-15

Bypass Triangle Route................................... 12-6

C

Cable Modem ............................................C, 11-2

Call Back Delay............................................. 23-6

Call Control ................................................... 35-3

Call History.................................................... 35-5

Call Scheduling....................................... 1-4, 38-1

Max Number of Schedule Sets .................. 38-1

PPPoE ........................................................ 38-3

Precedence ................................................. 38-1