TMS zl Management and Configuration Guide ST.1.0.090213

Index – 9
V
viruses … 6-7
VLANs
associate with zone … 1-18, 1-24, 2-7
best practices … 1-25
guest … 2-10
host switch … 1-16
management … 3-27
OSPF … 9-42
remote … 2-9
VPN … 1-57
access policies for … 7-112
certificate for … 7-37
client
HP ProCurve … 7-140
Macintosh … 7-153
Windows Vista … 7-222
Windows XP … 7-172
GRE over IPsec … 7-110
internal … 1-14
IPsec … 7-21
L2TP … 7-96
perimeter deployment … 1-22
remote access … 1-14
routing for … 7-137
See also GRE
See also IPsec
See also L2TP
type
client-to-site … 1-14
site-to-site … 1-22
W
warranty … 1-ii
Web browser interface
access … 1-18, 2-39, 3-28
navigate … 2-44, 3-33
WinNuke attack … 4-92
worms … 6-7
X
XAUTH … 7-15
access policies … 7-120
client-to-site … 7-36
site-to-site … 7-28
XSS … 6-6
Z
zero-day attacks … 1-35
zones … 1-11
access control … 1-11, 1-12
associate VLANs with … 1-18, 2-67
best deployment practices 1-12, 2-10
define … 2-7
DMZ … 1-12, 2-8, 2-10
example configuration … 2-7
External … 1-12, 2-8, 2-10, 2-53
Internal … 1-12, 2-8, 2-10
management-access … 1-16, 1-24, 2-8
Self … 1-11, 2-8