ZyXEL Communications 10 User Manual
Page 486

ZyWALL 10~100 Series Internet Security Gateway
D
Index
ESS ............................... See Extended Service Set
ESS ID ........................................................... 6-10
ESSID ............................................................ 6-12
Ethernet Cable Pin Assignments........................30
Ethernet Encapsulation 5-4, 9-1, 10-2, 10-6, 10-7,
10-11, 12-14
Ethernet Specification for DMZ ........................28
Ethernet Specification for WAN........................28
Extended Service Set .........................................18
Extended Service Set IDentification.............. 6-12
F
Factory Default ................................................ 5-2
Fail Tolerance .............................................. 10-15
Fairness-based Scheduler............................... 25-5
FHSS...See Frequency-Hopping Spread Spectrum
Filename Conventions ................................... 22-1
Filter ........................... 5-15, 6-1, 8-2, 10-11, 19-1
About ......................................................... 19-1
Applying .................................................. 19-17
Configuration............................................. 19-1
Configuring................................................ 19-4
DMZ ........................................................ 19-17
Example ................................................... 19-13
Filter log .................................................... 21-7
Generic Filter Rule .................................. 19-11
Generic Rule ............................................ 19-11
NAT......................................................... 19-16
Remote Node ........................................... 19-18
Structure .....................................................19-2
TCP/IP Rule ...............................................19-7
Filters
Executing a Filter Rule...............................19-2
IP Filter Logic Flow ...................................19-9
Firewall.............................................................1-4
Access Methods..........................................14-1
Activating ...................................................14-2
Address Type............................................16-15
Alerts ..........................................................15-2
Connection Direction..................................16-4
Creating/Editing Rules .............................16-11
Custom Ports .........................See Custom Ports
Enabling .....................................................15-1
Firewall Vs Filters ....................................13-12
Guidelines For Enhancing Security..........13-11
Introduction ................................................13-2
LAN to WAN Rules ...................................16-4
Policies .......................................................16-1
Remote Management..................................14-1
Rule Checklist ............................................16-2
Rule Logic ..................................................16-2
Rule Precedence .........................................16-5
Rule Security Ramifications.......................16-3
Services ......................................................16-8
SMT Menus................................................14-1
Types ..........................................................13-1