user manual
Index-2
navigating 1-5
encryption 5-2, 5-7, 5-16, 6-1
event history
device
9-5
WAN 9-4
Exposed Addresses 3-3
Extended Authentication 6-6
F
factory default A-3
Factory Default from Configuration 10-47
filter
parts
10-22
parts of 10-22
filter priority 10-21
filter sets
adding
10-27
defined 10-20
deleting 10-32
disadvantages 10-26
display 10-23
sample (Basic Firewall) 10-32
using 10-27
filtering example #1 10-24
filters
actions a filter can take
10-21
adding to a filter set 10-29
defined 10-20
deleting 10-32
disadvantages of 10-26
input 10-29
modifying 10-31
output 10-29
using 10-26, 10-27
viewing 10-31
firewall 10-32
firmware files
updating with TFTP
11-7
FTP sessions 10-35
G
general statistics 9-6
Generic Routing Encapsulation (GRE) 5-
10
H
how to reach us A-4
I
IGMP Snooping 3-53
IKE 6-1
input filter 3 10-33
input filters 1 and 2 10-33
input filters 4 and 5 10-33
Internet Key Exchange 6-1
Internet Key Exchange (IKE) 5-7, 6-1
Internet Protocol (IP) 7-1
Invalid SPI recovery 6-9
IP address serving 7-17
IP setup 7-1, 7-2
IP trap receivers
deleting
9-12
modifying 9-12
setting 9-11
viewing 9-12
IPsec 5-2, 5-7, 6-1
L
L2TP 5-7
latency 2-25, 10-37
Layer 2 Tunnelling Protocol 5-7
LED status 9-3
LEDs 9-3