TMS zl Management and Configuration Guide ST.1.1.100430
Index – 7
passwords
dial-in user … 7-166
L2TP … 7-166
management … 2-59, 3-38
SCEP … 7-51, 7-103, 7-244
SNMPv1/v2c … 2-86, 3-59
SNMPv3 … 2-88, 3-61
user … 4-62
XAUTH … 7-85, 7-228, A-128
PAT
See NAT
persistent tunnel … 7-23
PIM-SM
See routing
ping … 2-90, 3-63, 10-5
policy violations … 6-6
polymorphism … 1-39
POP3 protocol anomaly … 6-17
port address translation
See NAT
port maps … 1-39, 4-85, 6-17
configure … 4-86, 4-87, 6-21
default mappings … 1-40, 4-85
troubleshooting … 10-54
port triggers … 1-59, 4-98
configure … 4-99
example configuration … 4-101
See also ALG
ports … 1-5, 1-7
data … 1-10, 1-11
high availability … 1-11
management traffic, for … 1-11
mirrored … 1-11
monitor mode … 1-11, 3-8
routing mode … 1-10
data … 1-21, 1-26
pre-connection ACK … 4-111
preshared key
IKE … 7-34
private key
algorithm … 7-38, 7-90, 7-232
import … 7-39, 7-90, 7-232
SCEP, with … 7-51, 7-103, 7-244
ProCurve Network Immunity Manager, integration
with … 6-37
product license
See licenses
protocol anomalies … 1-37, 6-9
DNS … 1-38
FTP … 1-38
HTTP … 1-38
IMAP … 1-38
POP3 … 1-38
RPC … 1-39
See also IPS or IDS
SMTP … 1-38
SNMP … 1-39
R
RADIUS … 4-47
authentication … 4-48
authorization … 4-52
access-control lists (ACLs) … 4-52
AVPs … 4-52
configure … 4-63
examples
with Internet Access Server (IAS) … 4-69
with Network Policy Server (NPS) … 4-78
troubleshooting external … 10-87
reconnaissance … 6-8
redundancy
See HA
rekey IPsec SA … 7-23
resource reservations
See connection reservations
restore configuration
See maintenance
RIP … 9-15
advantages and disadvantages … 9-13
comparison with OSPF … 9-12
configuration considerations … 9-19
intervals … 9-18
route redistribution … 1-68
updates … 1-68, 9-16
versions
compatibility … 1-67