ZyXEL Communications 792H Router User Manual


 
Header
H TCP/IP
Index
10/100 MB Auto-negotiation ........................... 1-3
Action for Matched Packets......................... 10-13
Active.................................................... 21-5, 21-7
Address Assignment ........................................ 4-2
Allocated Budget ........................................... 21-6
Application Scenario ....................................... 1-4
Application-level Firewalls.............................. 8-1
AT command ...............................21-2, 21-3, 31-1
Attack Alert ..9-2, 9-3, 9-5, 9-6, 10-5, 12-5, 14-27
Attack Types.................................................... 8-6
Authen ........................................................... 21-5
Authentication..............................5-12, 21-5, 24-4
auto-negotiation ............................................... 1-3
Backup........................................................... 31-2
Blocking Time ................................................. 9-5
Bridging
Ether Address ............................................ 26-3
Ethernet ..................................................... 26-1
Ethernet Addr Timeout.............................. 26-2
Remote Node............................................. 26-1
Static Route Setup ................................... 26-2
Brute-force Attack,......................................... 8-6
Budget Management............................. 32-2, 32-3
Call Back Delay............................................. 21-4
Call Filtering.................................................. 28-1
Call Filters
Built-In ...................................................... 28-1
User-Defined ............................................. 28-1
Call Scheduling.............................................. 34-1
Maximum Number of Schedule Sets......... 34-1
PPPoE........................................................ 34-3
Precedence................................................. 34-1
Precedence Example................. See precedence
CDR............................................................... 30-7
CDR (Call Detail Record).............................. 30-6
CHAP ................................................... 21-5, 24-4
CHAP (Challenge Handshake Authentication
Protocol).......................................................1-3
Collision .........................................................30-3
Command Interpreter Mode ...........................32-1
Community.....................................................29-2
Computer Name .............................................19-1
Conditions that prevent TFTP and FTP from
working over WAN....................................31-4
Configuration........................................ 3-15, 17-6
Content Filtering.............................................12-1
Categories...................................................12-1
Exempt Computers.....................................12-4
Keywords ......................................... 12-1, 12-3
Cost Of Transmission........................... 24-6, 25-3
Country Code .................................................30-4
CPU Load.......................................................30-3
Custom Ports
Creating/Editing .........................................11-2
Introduction................................................11-1
Customized Services ......................................11-2
Data Filtering..................................................28-1
Default Policy Log .........................................10-8
Denial of Service ........................8-2, 8-3, 9-4, 9-5
Destination Address ........................... 10-3, 10-13
Device Filter rules ........................................28-16
DHCP ............. 1-3, 3-15, 4-2, 4-3, 7-1, 17-6, 30-4
Diagnostic.......................................................30-8
Diagnostic Tools.............................................30-1
Dial Timeout...................................................21-4
DNS................................................................22-5
Domain Name........................................... 4-2, 6-6
Domain Name System......................................4-1
DoS
Basics ...........................................................8-3
Types............................................................8-4
DoS (Denial of Service) ...................................1-2
Drop Timeout .................................................21-4