Prestige 652H/HW Series User’s Guide
Index
L-3
PPP over Ethernet ........................................ 3-1
PPPoA.......................................................... 3-1
RFC 1483..................................................... 3-2
Encapsulation Security Payload..................... 16-1
Encryption.............................................7-11, 15-1
Error Log........................................................ 37-5
Error/Information Messages
Sample ....................................................... 37-6
ESP................................................................. 15-3
ESP Protocol .................................................. 16-1
ESS................................
See
Extended Service Set
ESS ID ............................................................. 7-1
Ethernet Encapsulation .................................... 9-5
Ethernet Traffic............................................ 34-18
Example Internal SPTGEN Screens................ H-1
Extended Service Set ...................................... C-2
F
Factory LAN Defaults...................................... 5-2
Fairness-based Scheduler............................... 20-4
FCC.................................................................... iii
FHSS...
See
Frequency-Hopping Spread Spectrum
Filename Conventions.................................... 38-1
Filter...........................................24-15, 25-1, 28-1
Applying Filters....................................... 34-17
Ethernet traffic......................................... 34-18
Ethernet Traffic........................................ 34-18
Filter Rules ................................................ 34-6
Filter Structure........................................... 34-4
Generic Filter Rule .................................. 34-12
Remote Node ............................................. 29-8
Remote Node Filter.................................... 29-9
Remote Node Filters ................................ 34-18
Sample ..................................................... 34-16
SUA ......................................................... 34-14
TCP/IP Filter Rule ..................................... 34-7
Filter Log ....................................................... 37-7
Filter Rule ...................................................... 34-8
Filter Rule Process ......................................... 34-3
Filter Rule Setup ............................................ 34-7
Filter Rules Summary
Sample..................................................... 34-17
Filter Set
Class .......................................................... 34-7
Filter Set Configuration ................................. 34-4
Filtering ................................................ 34-1, 34-7
Filtering Process
Outgoing Packets....................................... 34-2
Finger............................................................... 9-6
Firewall................................................... 1-1, 12-1
Access Methods................................ 13-1, 33-1
Address Type........................................... 13-12
Alerts ....................................................... 13-24
Connection Direction................................. 13-4
Creating/Editing Rules ............................ 13-10
Custom Ports .........................
See
Custom Ports
Enabling .................................................... 13-1
Firewall Vs Filters ................................... 12-12
Guidelines For Enhancing Security......... 12-11
Introduction ............................................... 12-2
LAN to WAN Rules .................................. 13-4
Policies ...................................................... 13-1
Remote Management................................. 33-1
Rule Checklist ........................................... 13-2
Rule Logic ................................................. 13-2
Rule Security Ramifications...................... 13-3
Services ................................................... 13-19
SMT Menus............................................... 33-1
Types ......................................................... 12-1
When To Use........................................... 12-13
Firewall Threshold....................................... 13-26
Firmware File
Maintenance ................................. 21-11, 21-13
Fragment Threshold....................................... 26-3
Fragmentation Threshold................................. 7-3
Frame Relay..................................................... 1-7
Frequency-Hopping Spread Spectrum.............C-1
FTP ...................... 9-5, 9-6, 10-1, 17-1, 17-3, 40-3
Restrictions................................................ 40-3
FTP File Transfer......................................... 38-10
FTP Restrictions ................................... 17-1, 38-4
FTP Server................................................... 32-14
Summary of Contents for Prestige 652H series
Page 32: ......
Page 50: ......
Page 66: ......
Page 68: ......
Page 76: ......
Page 80: ......
Page 120: ...Prestige 652H HW Series User s Guide 8 12 WAN Setup Figure 8 6 Advanced WAN Backup ...
Page 128: ......
Page 146: ......
Page 148: ......
Page 162: ......
Page 178: ...Prestige 652H HW Series User s Guide 13 16 Firewall Screens Figure 13 8 Rule Edit Example ...
Page 196: ......
Page 198: ......
Page 204: ......
Page 214: ...Prestige 652H HW Series User s Guide 16 10 VPN Screens Figure 16 5 VPN IKE ...
Page 227: ...Prestige 652H HW Series User s Guide VPN Screens 16 23 Figure 16 8 Manual Setup ...
Page 238: ......
Page 258: ......
Page 277: ...Maintenance VIII Part VIII Maintenance This part covers the maintenance screens ...
Page 278: ......
Page 296: ......
Page 298: ......
Page 308: ......
Page 324: ......
Page 330: ......
Page 386: ......
Page 406: ......
Page 418: ......
Page 428: ......
Page 450: ......
Page 454: ......
Page 464: ......
Page 470: ......
Page 486: ......
Page 494: ......
Page 500: ......
Page 512: ......
Page 516: ......
Page 520: ......
Page 560: ......
Page 574: ......