beautypg.com

ZyXEL Communications P-2608HWL-Dx Series User Manual

Page 443

background image

P-2608HWL-Dx Series User’s Guide

Index

443

Domain Name System, See DNS
domain name, and ISPs

319

domain name, of system

319

DoS

189

types

190

DoS (Denial of Service)

basics

189

DoS thresholds, and firewall

213

DoS, attacks

190

DS Field

158

DS field

158

DSCPs

158

DSL line

diagnostics

345

DTMF

156

DTMF Detection and Generation

366

Dual-Tone Multi-Frequency

156

dynamic DNS

289, 290

and DHCP

289

and ISPs

289

and services

289

and WAN

289

configuration

290

wildcard feature

289

Dynamic Jitter Butter

366

E

EAP-MD5

365

Echo Cancellation

366

echo cancellation

167

e-mail

and logs

327

E-Mail, application priority

137

emergency numbers, and VoIP

185

Encapsulated Routing Link Protocol (ENET ENCAP)

89

Encapsulating Security Payload. See ESP.
encapsulation

89

and active protocol

228

ENET ENCAP

89

multiprotocol

90

PPP over Ethernet

89

PPPoA

90

RFC 1483

90

transport mode

229

tunnel mode

228

VPN

228

encryption algorithms

223

and active protocol

223

encryption, wireless

128

errors, types of logs

325

ESP

228

and transport mode

229

Ethernet lights

349

Europe type call service mode

168

Europe type supplementary services

168

extended authentication

IKE SA

225

Extended Service Set IDentification

124

extended wireless security

63

External RADIUS

365

F

F4/F5 OAM

364

factory defaults

336

fairness-based bandwidth management

279

FCC interference statement

4

file names, and configuration

331

filename conventions

332

filtering content

217

filters vs. firewalls

197

firewall

209

access methods

199

address type

207

alert

215

alerts

202

and file maintenance

332

and ICMP

303

and remote management

293

anti-probing

213

creating/editing rules

205

custom ports

208

default policy

199

DoS threshold

213

enabling

202

example

209

example rule

209

LAN to WAN rules

202

policies

199

rule checklist

200

rule example

200

rule logic

200

rule security ramifications

200

rules

200

key fields

201

types

187

web configurator

199

firewalls

195

and brute-force attacks

191

and handshake

190

and IP Spoofing

193

and LAND

190

and Ping of Death

190