Owner manual

Index-2
navigating 1-5
encryption
5-2, 5-7, 5-17, 6-1
event history
device
9-5
WAN
9-4
Exposed Addresses
3-4
Extended Authentication
6-6
F
factory default
A-3
Factory Default from Configuration
10-48
filter
parts
10-23
parts of
10-23
filter priority
10-22
filter sets
adding
10-29
defined
10-21
deleting
10-33
disadvantages
10-27
display
10-25
sample (Basic Firewall)
10-33
using
10-28
filtering example #1
10-26
filters
actions a filter can take
10-22
adding to a filter set
10-30
defined
10-21
deleting
10-33
disadvantages of
10-27
input
10-30
modifying
10-32
output
10-30
using
10-27, 10-28
viewing
10-32
firewall 10-33
firmware files
updating with TFTP
11-7
FTP sessions
10-36
G
general statistics
9-6
Generic Routing Encapsulation (GRE)
5-
11
H
how to reach us
A-4
I
IGMP Snooping
3-40
IKE
6-1
input filter 3
10-34
input filters 1 and 2
10-34
input filters 4 and 5
10-34
Internet Key Exchange
6-1
Internet Key Exchange (IKE)
5-7, 6-1
Internet Protocol (IP)
7-1
Invalid SPI recovery
6-8
IP address serving
7-17
IP setup
7-2
IP trap receivers
deleting
9-13
modifying
9-13
setting
9-12
viewing
9-13
IPsec
5-2, 5-7, 6-1
L
L2TP
5-8
latency
2-25, 10-38
Layer 2 Tunnelling Protocol
5-8
LED status
9-3
LEDs
9-3