beautypg.com

Index – ZyXEL Communications ZYWALL10 User Manual

Page 263

background image

ZyWALL 10 Internet Security Gateway

Index

Y

Index

A

Action for Matched Packets .......................... 16-11
Activate The Firewall ...................................... 19-3
Alert Schedule ................................................ 15-5
Application-level Firewalls .............................. 13-1
AT command .................................................. 10-1
Attack

Reasons .............................................................. 18-2

Attack Alert ........................ 15-7, 15-8, 15-9, 15-10
Attack Types................................................... 14-3

Reason................................................................ 14-5

Authentication............................................ 4-3, 4-4

B

BackOrifice .......................................................... N
backup............................................................ 10-2
Big Picture

Filtering, Firewall and NAT............................... 14-5

Blocking Time ...................................... 15-8, 15-11
Boot commands.............................................. 11-8
Broadband Access Security Gateway ...i, xxvii, 1-1
Brute Force Hacking............................................ N
Budget Management ............................. 11-2, 11-3

C

Cable Modem ................................... 2-2, 2-3, 13-2
Call Control..................................................... 11-2
Call History ............................................ 11-3, 11-4
Call-Trigerring Packet..................................... 9-10
CDR.................................................................. 9-7
CHAP ............................................................... 4-4
CLI Commands....................................................G
Command Interpreter Mode ........................... 11-1
Configuring A POP Custom Port .................... 19-8
Console Port...................................2-2, 9-3, 9-5, E
Content Filtering ............................................. 20-1

Categories .......................................................... 20-1
Customizing ....................................................... 20-5
Days and Times.................................................. 20-1

Exempting Computers ........................................20-4
Filter List ............................................................20-1
Keywords............................................................20-6
Log Records........................................................20-7
Restrict Web Features .........................................20-1
Update List .........................................................20-3

Custom Ports

Creating/Editing..................................................17-3
Introduction ........................................................17-1

Customer Support ..............................................viii
Customized Services.......................................17-2

D

DDNS

Configuration......................................................2-11

Default Permit Log ..........................................16-6
Denial of Service ................. 13-2, 13-3, 14-1, 15-8
Denial of Services

Thresholds ........................................................15-10

DestAdd ........................................................19-10
Destination Address ............................ 16-2, 16-11
DHCP (Dynamic Host Configuration Protocol) .......

.............................................................. 1-2, 3-1

DHCP Ethernet Setup .......................................3-4
DHCP Negotiation .........................................19-12
Diagnostic .......................................................9-10
DNS...................................................................3-1
Domain Name .......................3-1, 6-14, 9-3, 9-4, P
DoS

Basics..................................................................13-3
Types ..................................................................13-4

DoS (Denial of Service).....................................1-1
Dynamic DNS........................................ 2-10, 2-11
DYNDNS Wildcard ..........................................2-10

E

EG 2 - Internet Rule Summary ......................19-12
EG 2 - Local Network Rule Summary............19-10
EG 3 - Rule Summary ...................................19-14
E-mail Alerts....................................................15-5
E-mail Screen..................................................19-4