TMS zl Management and Configuration Guide ST.1.1.100226

Index – 9
V
viruses … 6-7
VLANs
associate with zone … 1-21, 1-26, 2-8
best practices … 1-28
guest … 2-11
host switch … 1-17
management … 3-24
non-TMS … 2-12
OSPF … 9-43
VPN … 1-64
certificate for … 7-35, 7-87, 7-229
client
HP ProCurve … 7-366
Macintosh … 7-378
Windows Vista … 7-448
Windows XP … 7-396
GRE over IPsec … 7-208, 7-265
internal … 1-15
IPsec … 7-27, 7-76, 7-122
L2TP … 7-142
perimeter deployment … 1-24
remote access … 1-15
routing for … 7-121, 7-139
See also GRE
See also IPsec
See also L2TP
type
client-to-site … 1-15
site-to-site … 1-24
W
warranty … 1-ii
Web browser interface
access 1-20, 2-42, 3-25
navigate … 2-48, 3-31
WinNuke attack … 4-107
worms … 6-7
X
XAUTH … 7-19
access policies … 7-71
client-to-site … 7-33
site-to-site … 7-84, 7-227
XSS … 6-6
Z
zero-day attacks … 1-39
zones … 1-12
access control … 1-12, 1-13, 2-9
associate VLANs with … 1-21, 2-81
best deployment practices … 1-13, 2-11
define … 2-8
DMZ … 1-13, 2-9, 2-11
example configuration … 2-13
External … 1-13, 2-9, 2-11, 2-58
Internal … 1-13, 2-9, 2-11
management-access … 1-18, 1-26, 2-10
Self … 1-12, 2-9