beautypg.com

ZyXEL Communications Parental Control Gateway HS100/HS100W User Manual

Page 356

background image

HomeSafe User’s Guide

L-4

Index

Roaming ......................................................... 6-5

Enable on ZyAIR ..................................... 20-8
Example ..................................................... 6-6
Requirements ............................................. 6-6

Route ............................................................ 22-2
RTC ......................................See Real Time Chip
RTS Threshold ...................................... 6-3, 20-6
Rules

Predefined Services................................ 12-13

S

Schedule Sets

Duration ................................................... 34-2

Schedules...................................................... 22-4
Security Parameters ........................................ 7-3
Select ............................. See Syntax Conventions
Server 4-5, 9-3, 9-4, 21-1, 21-2, 22-2, 25-2, 25-4,

25-5, 25-6, 25-8, 32-4

Server IP ....................................................... 22-2
Service ................................................................v
Service Name ............................................... 22-4
Service Set...................................................... 6-5
Service Type........................................ 21-1, 22-2
Services ................................................. 9-5, 13-4
setup a schedule............................................ 34-1
SMT Menu Overview................................... 17-1
SMTP ............................................................. 9-5
SNMP ...........................................9-5, 13-2, 14-5

Community .............................................. 28-2
Configuration ........................................... 28-2
Get................................................... 14-6, 28-1
Manager .......................................... 14-6, 28-1
MIBs ............................................... 14-7, 28-2
Trap ................................................. 14-6, 28-2
Trusted Host............................................. 28-2

SNMP ( Simple Network Management Protocol)

................................................................... 1-3

Stateful Inspection ................................. 1-2, 13-1
Static Route .................................................. 10-1
SUA.......................................... 9-4, 9-5, 9-6, 9-7
SUA (Single User Account) . See NAT. See NAT
Subnet Mask ..3-9, 5-1, 5-5, 20-3, 21-2, 22-5, 23-

2, 30-3

Support Disk.................................................. xxii
Syntax Conventions...................................... xxiii
Syslog ........................................................... 30-4
Syslog IP Address ........................................ 30-4
Syslog Server................................................ 30-4
System

Console Port Speed .................................. 30-4
Diagnostic ................................................ 30-6
Log and Trace .......................................... 30-4
Syslog and Accounting ............................ 30-4
System Information.................................. 30-3
System Status ........................................... 30-1

System Information ...................................... 30-3
System Information & Diagnosis ................. 30-1
System Maintenance15-1, 30-1, 30-2, 30-3, 30-7,

31-2, 31-3, 31-7, 32-1, 32-2, 32-3, 32-4

System Management Terminal ..................... 17-2
System Name......................................... 4-1, 18-1
System Status................................................ 30-2
System Timeout............................................ 14-2

T

TCP/IP ....5-5, 14-3, 20-3, 22-5, 27-4, 27-5, 27-6,

27-8, 27-11
Setup......................................................... 20-3

TCP/IP filter rule .......................................... 27-4
Telnet............................................................ 14-3
Telnet Configuration..................................... 14-3
TFTP and FTP over WAN Management

Limitations ............................................... 31-3

TFTP and FTP Over WAN}................ 14-1, 33-2
TFTP File Transfer ....................................... 31-7
TFTP Restrictions.......................14-1, 31-3, 33-2
Time and Date ................................................ 1-1
Time and Date Setting .................................. 32-4
Time Setting ................................................... 4-4
Time Zone .................................................... 32-5
Timeout ......................................21-3, 21-4, 22-4
TLS ................................................................ H-1
Trace Records ............................................... 30-4
Tracing............................................................ 1-4
Trademarks ........................................................ ii
Traffic Redirect........................................ 1-4, 8-9

Setup......................................................... 22-7

Transport Layer Security ........................See TLS
Triangle ......................................................... K-1
Triangle Route\ Solutions .............................. K-1
Trigger Port Forwarding ............................. 25-12

Process ..................................................... 9-10

TTLS ............................................................. H-1
Tunneled Transport Layer Service ...... See TTLS

U

Universal Plug and Play ................................. 1-3
Universal Plug and Play (UPnP).......... 11-1, 11-2
UNIX Syslog ................................................ 30-4
UNIX syslog parameters .............................. 30-4
Upload Firmware.......................................... 31-5
UPnP............................................................... 1-3
UPnP Examples ............................................ 11-2
Use Server Detected IP................................. 18-4
User Authentication........................................ 7-6
User Name ............................................. 4-3, 18-3
User Profiles ........................................ 7-19, 24-1
User Specified IP Addr................................. 18-4