beautypg.com

Index – ZyXEL Communications Broadband Security Gateway P-312 User Manual

Page 250

background image

P312 Broadband Security Gateway

Index

CC

Index

A

Action for Matched Packets .......................... 16-10
Activate The Firewall ...................................... 19-2
ActiveX ........................................................... 20-1
Add Keyword .................................................. 20-3
Alert Schedule ................................................ 15-5
Application-level Firewalls .............................. 13-1
AT command .................................................. 10-1
Attack

Reasons .............................................................. 18-2

Attack Alert ................................. 15-7, 15-9, 15-10
Attack Types................................................... 14-3

Reason................................................................ 14-5

Authentication............................................ 4-3, 4-4

B

BackOrifice .......................................................... R
backup............................................................ 10-2
Big Picture

Filtering, Firewall and NAT............................... 14-5

Block Web URLs ............................................ 20-3
Blocking Time ............................. 15-8, 15-9, 15-11
Blocking URLs ................................................ 20-2
Boot commands.............................................. 11-7
Broadband Security Gateway ............ i, ii, xxvii, 1-1
Brute Force Hacking............................................ R
Budget Management ............................. 11-2, 11-3

C

Cable Modem ................................... 2-2, 2-3, 13-2
Call Control..................................................... 11-2
Call History ............................................ 11-3, 11-4
Call-Trigerring Packet..................................... 9-10
CDR.................................................................. 9-7
CHAP ............................................................... 4-4
CLI Commands.................................................... K
COM (Component Object Model) ................... 20-1
Command Interpreter Mode ........................... 11-1
Configuring A POP Custom Port .................... 19-8

Configuring A Rule ..........................................19-5
console port.......................................................2-3
Console Port ................................... 2-3, 9-4, 9-5, I
Content Filtering ..............................................20-1
Cookies ...........................................................20-2
Custom Ports

Creating/Editing..................................................17-2
Introduction ........................................................17-1

Customer Support ..............................................viii
Customized Services.......................................17-2

D

DDNS

Configuration........................................................2-9

Default Permit Log ..........................................16-7
Denial of Service ................. 13-2, 13-3, 14-1, 15-8
Denial of Services

Thresholds ........................................................15-10

DestAdd ........................................................19-10
Destination Address .............................. 16-2, 16-9
DHCP ................................................................3-3
DHCP (Dynamic Host Configuration Protocol)1-2,

3-3

DHCP Negotiation .........................................19-11
Diagnostic .......................................................9-10
DNS........................................................... 3-3, 3-6
Domain Name ....................... 3-3, 6-13, 9-3, 9-5, T
DoS

Basics..................................................................13-3
Types ..................................................................13-4

DoS (Denial of Service).....................................1-1
Dynamic DNS............................................ 2-8, 2-9
DYNDNS Wildcard ............................................2-8

E

EG 2 - Internet Rule Summary ......................19-11
EG 2 - Local Network Rule Summary............19-10
EG3 - Rule Summary ....................................19-14
E-Mail Alerts....................................................15-5
E-Mail Screen..................................................19-3
E-Mail tab ........................................................15-4