ZyXEL Communications P-334W User Manual
Page 492

Prestige 334W User’s Guide
L-2 Index
Disclaimer............................................................ii
Distribution System ......................................... F-3
DNS .................................................... 14-11, 23-3
DNS Server
For VPN Host............................................ 16-7
Domain Name............. 3-1, 3-11, 10-7, 18-3, 33-3
DoS (Denial of Service)................................... 1-2
DS ................................... See Distribution System
DSL Modem ........................................... 1-6, 25-4
DSSS.........See Direct Sequence Spread Spectrum
Dynamic DNS......................................... 5-3, 21-3
Dynamic DNS Support .................................... 1-4
Dynamic WEP Key Exchange....................... 8-17
DYNDNS Wildcard......................................... 5-3
E
e.g. ..................................See Syntax Conventions
EAP.................................................................. 1-2
EAP Authentication ............................... H-1, 8-30
MD5 ............................................................H-1
TLS..............................................................H-1
TTLS ...........................................................H-1
ECHO ................................................... 10-7, 18-3
Edit IP............................................................ 25-3
eDonkey......................................................... 18-3
E-Mail............................................................ 18-2
eMule............................................................. 18-3
Enable Wildcard ............................................ 21-4
Encapsulation...............................24-2, 25-2, 25-6
PPP over Ethernet........................................A-1
Encryption ....................................................... 8-9
Enter ...............................See Syntax Conventions
ESS 7-2. See Extended Service Set. See Extended
Service Set
Ethernet............................................3-5, 3-7, 13-2
Ethernet Encapsulation 10-6, 24-1, 25-1, 25-2, 25-
9
Extended Service Set ................................F-3, 7-2
Extended Service Set IDentification................ 7-6
F
Factory Default...............................................22-1
Factory LAN Defaults ......................................6-1
Fail Tolerance...............................................25-11
FCC ....................................................................iii
FHSS .. See Frequency-Hopping Spread Spectrum
Filename Conventions ....................................34-1
Filter ..................................................... 23-1, 25-9
Applying...................................................30-16
Configuring ................................................30-4
Example ...................................................30-13
Generic Filter Rule...................................30-11
Generic Rule ............................................30-11
NAT .........................................................30-15
Remote Node............................................30-17
Structure.....................................................30-2
TCP/IP Rule ...............................................30-7
Filters
Executing a Filter Rule...............................30-2
IP Filter Logic Flow ...................................30-9
Finger ................................................... 10-7, 18-3
Firewall.......................................... 1-2, 13-1, 13-2
Access Methods .........................................29-1
Remote Management .................................29-1
SMT Menus................................................29-1
Firmware File
Maintenance ..................................... 19-6, 19-8
Fragment Threshold........................................23-7
Fragmentation Threshold..................................7-4
Frequency-Hopping Spread Spectrum............. F-2
FTP...5-3, 6-1, 10-6, 10-7, 13-2, 14-2, 14-6, 18-3,
36-2
FTP File Transfer ...........................................34-8
FTP Restrictions .......................... 14-2, 34-4, 36-2
FTP Server............................................ 1-5, 28-13
Full Network Management...............................1-5
G
Gateway..........................................................26-2
Gateway IP Addr ............................................25-7