User`s guide
ZyAIR B-5000 User’s Guide
K-2 Index
I
ICMP echo.................................................... 28-5
IEEE 802.11
Deployment Issues..................................... D-1
Security Flaws ........................................... D-1
IEEE 802.1x...................................D-1, 1-2, 13-1
Advantages ................................................ D-1
Independent Basic Service Set...................... 12-1
Internet Access.........................................1-3, 4-4
Internet Control Message Protocol (ICMP).. 28-5
Internet Protocol ........................................... 28-8
IP See Internet Protocol
IP Address.... 4-2, 4-3, 4-5, 4-6, 4-7, 4-8, 4-10, 4-
11, 5-6, 5-8, 5-9, 5-10, 5-12, 5-13, 5-14, 5-16,
5-17
IP Addressing ................................................. 3-1
IP Pool Setup ................................................ 10-1
IP Ports ......................................................... 28-3
IP Spoofing ...............................28-3, 28-6, 28-12
IP Zero Length Attack .................................. 28-6
L
LAND ..................................................28-4, 28-5
M
MAC Address Filtering ................................ 14-1
Management Information Base (MIB).......... 19-2
MD5................................................................E-1
Message Digest Algorithm 5 ................ See MD5
N
NAT................................................................ 4-3
Network Management ...........................1-3, 11-2
Network Topology With RADIUS Server
Example..................................................... D-2
NNTP............................................................ 11-2
P
Ping of Death ................................................ 28-3
Point-to-Point Tunneling Protocol ................11-2
POP3....................................................11-2, 28-3
Port Numbers ................................................11-1
PPPoE .............................................. 4-2, 5-4, 5-5
PPTP ............................................................. 11-2
Private IP Address ..........................................4-2
Q
Quick Installation Guide........................... xx, 2-1
R
RADIUS ................................................1-2, 13-1
Related Documentation.................................... xx
Remote Authentication Dial In User Service. See
RADIUS
Restore Configuration...................................27-5
Router .............................................................3-1
RTS Threshold.....................................4-13, 12-3
S
Server Mapping.............................................11-1
Service .............................................................. iv
Service Set ...........................................4-17, 12-6
Services.........................................................11-1
SMTP............................................................11-2
Smurf ....................................... 28-5, 28-6, 28-12
SNMP .......................................... 1-3, 11-2, 19-1
Get.............................................................19-2
Manager ....................................................19-2
MIBs .........................................................19-2
Trap...........................................................19-2
Stateful Inspection ..........................................1-2
Static Route...................................................17-1
Subnet Mask .. 4-3, 4-5, 4-6, 4-7, 4-8, 4-10, 4-11,
5-6, 5-8, 5-9, 5-10, 5-12, 5-13, 5-14, 5-16, 5-
17
Supporting Disk ............................................... xx
SYN Flood...........................................28-4, 28-5
SYN-ACK.....................................................28-4
System Name ............................ 6-4, 7-2, 7-4, 8-6