TMS zl Management and Configuration Guide ST.1.0.090213
6 – Index
examples … 5-25
destination policy … 5-38
exclusion policy … 5-42
inside the LAN … 5-25
limited pool … 5-35
many-to-one source policy … 5-31
network merger … 5-25
port forwarding … 5-38
port translation … 5-38
single internet address … 5-31
source policy … 5-25, 5-31, 5-35
exclusion … 5-10
configure … 5-21
inside the LAN … 1-14, 5-2
packet flow … 5-10
destination … 5-13
source … 5-12
parameters … 1-56
perimeter deployment … 1-22, 5-2
port forwarding … 1-54, 1-55, 5-4, 5-8, 5-9
port translation … 5-5, 5-9, 5-15
source … 1-54, 5-3
configure … 5-16
many-to-many … 1-55, 5-5, 5-15
many-to-one … 1-54, 5-4, 5-15
one-to-one … 1-54, 5-4, 5-15
packet flow … 5-12
parallel firewall access policies … 5-23
zones … 1-56
types … 1-54, 5-3, 5-15
network access server
See RADIUS
network address translation
See NAT
network outage … 1-15, 1-23
NIM, integration with … 6-43
Not So Stubby Area
See OSPF
O
objects
See named objects
operating mode … 1-7
monitor … 1-9, 3-38
routing … 1-7, 2-54
OSI model … 4-5
OSPF … 1-61, 9-25
access policies for … 9-46
advantages and disadvantages … 9-12
areas … 1-61, 9-26, 9-27
backbone … 1-61, 9-29
configure … 9-45
example configuration … 9-48
normal (Area 0) … 1-61
NSSA … 1-61, 9-29
stub … 1-61, 9-28
authentication … 1-62
configure … 9-33, 9-34
comparison with RIP … 9-11
configuration considerations … 9-36
configure … 9-35, 9-38
enable … 9-39
router ID … 9-40
example topology … 9-36, 9-37, 9-49
intervals … 9-33
LSAs … 9-25, 9-26, 9-30
parameters … 9-38
redistributing routes … 9-41
RFC-1583 compatibility … 1-62
route computation … 9-32
routers … 1-62
ABR … 1-62, 9-10, 9-31
ASBR … 1-62, 9-28
internal … 1-62, 9-27
stub…9-28
VLANs … 9-42
P
packet flow … 1-66
IDS … 6-14
IPS … 6-15
monitor mode … 4-8
NAT … 5-10
destination … 5-13
source … 5-12
routing mode … 4-7
packet fragmentation
See IP reassembly
passwords
dial-in user … 7-104, 7-105
L2TP … 7-105
L2TP shared secret … 7-267
management … 2-54, 3-39
SCEP … 7-51