ZyXEL Communications 650 Series User Manual
Page 508

Prestige 650 Series User’s Guide
J-2 Index
D
Data encryption......................................................... 5-4
Data Filtering.......................................................... 31-1
Default Policy Log.................................................. 12-8
Denial of Service ............... 10-2, 10-3, 11-4, 11-5, 32-1
Destination Address.....................................12-3, 12-13
Device Filter rules................................................. 31-16
DHCP ............................. 1-5, 3-12, 4-2, 8-1, 21-6, 35-4
Diagnostic Tools..................................................... 35-1
Digital Subscriber Line Access Multiplexer ............. 1-7
Direct Sequence Spread Spectrum........................... C-1
Distribution System ................................................. C-2
DNS ........................................................................ 24-3
Domain Name....................................................4-2, 7-6
Domain Name System .............................................. 4-1
DoS
Basics ........................................................ 10-3
Types ......................................................... 10-4
DoS (Denial of Service)............................................ 1-4
DS............................................ See Distribution System
DSL (Digital Subscriber Line).............................. xxviii
DSL, What Is It?................................................... xxviii
DSLAM ..................See Digital Subscriber Line Access
Multiplexer
DSSS .................See Direct Sequence Spread Spectrum
Dynamic DNS...........................................1-4, 8-1, 23-2
DYNDNS Wildcard.................................................. 8-1
E
EAP .......................................................................... 1-3
ECHO ....................................................................... 7-6
E-mail
Log Example ............................................. 19-6
Encapsulation..................................1-6, 3-1, 26-5,
27-2
ENET ENCAP............................................. 3-1
PPP over Ethernet........................................ 3-1
PPPoA ......................................................... 3-1
RFC 1483 .................................................... 3-2
Error Log ................................................................ 35-5
Error/Information Messages
Sample....................................................... 35-6
ESS ........................................ See Extended Service Set
ESS ID...................................................................... 5-1
Ethernet Encapsulation ............................................. 7-5
Ethernet Traffic .................................................... 31-20
Extended Service Set................................................C-2
F
Factory LAN Defaults .............................................. 4-2
Fairness-based Scheduler ....................................... 20-4
FCC ............................................................................ iii
FHSS ........... See Frequency-Hopping Spread Spectrum
Filename Conventions ............................................ 36-1
Filter ....................................................................... 24-1
Applying Filters .......................................31-19
Ethernet traffic .........................................31-20
Ethernet Traffic ........................................31-20
Filter Rules.................................................31-8
Filter Structure ...........................................31-4
Generic Filter Rule...................................31-14
Remote Node..............................................27-9
Remote Node Filter ....................................27-9
Remote Node Filters ................................31-20
Sample......................................................31-18
SUA..........................................................31-16
TCP/IP Filter Rule......................................31-9
Filter Log....................................................... 35-7, 35-8
Filter Rule............................................................. 31-10
Filter Rule Process.................................................. 31-3
Filter Rule Setup..................................................... 31-9
Filter Rules Summary
Sample......................................................31-19
Filter Set
Class...........................................................31-9
Filter Set Configuration................................. 31-4, 31-6
Filtering ......................................................... 31-1, 31-9
Filtering Process
Outgoing Packets .......................................31-2
Finger ....................................................................... 7-6
Firewall..................................................................... 1-4
Access Methods .........................................32-1
Address Type ...........................................12-14
Alerts..........................................................11-4
Connection Direction .................................12-3
Creating/Editing Rules .............................12-11
Custom Ports ......................... See Custom Ports
Enabling .....................................................11-1