Wireless Gateway Series User's Guide

ZyAIR Wireless Gateway Series User’s Guide
Index Q-3
Fragmentation Threshold ................................6-4
Frequency-Hopping Spread Spectrum ...........D-2
FTP.......................4-2, 5-2, 9-6, 13-1, 13-4, 30-3
Restrictions ...............................................30-3
FTP File Transfer........................................28-10
FTP Restrictions.................................. 13-1, 28-4
FTP Server ..................................................23-13
G
Gateway ........................................................21-9
General Setup................................. 3-2, 4-1, 18-1
Global..............................................................9-1
H
Hidden Menus...............................................17-5
Hop Count........................................... 21-6, 21-9
Host....................................................... 4-6, 18-4
Host IDs .......................................................... J-1
HTTP ..................................9-6, 11-1, 11-3, 23-8
HyperTerminal program ..................... 28-6, 28-9
I
IBSS.............. See Independent Basic Service Set
ICMP echo ....................................................11-5
IEEE 802.11...................................................D-1
Deployment Issues..................................... E-1
Security Flaws............................................ E-1
IEEE 802.1x............................................ E-1, 1-4
Advantages................................................. E-1
IGMP ..............................................................5-3
IGMP support................................................21-6
Independent Basic Service Set...... D-2, 6-1, 16-7
Infrastructure Configuration...........................D-2
Initialization ..................................................17-2
Inside...............................................................9-1
Inside Global Address.....................................9-1
Inside Local Address.......................................9-1
Internet access...............................................19-1
Internet Access....................1-5, 17-6, 20-1, 20-2
Internet Access Setup............................A-2, 23-1
Internet Control Message Protocol (ICMP) ..11-5
IP Address .. 3-11, 3-12, 5-5, 9-6, 9-7, 16-4, 19-3,
21-9, 24-8, 27-4, 27-8
IP Addressing.................................................. J-1
IP Alias Setup................................................19-5
IP Classes ........................................................ J-1
IP Filter .......................................................24-10
Logic Flow ................................................24-9
IP mask..........................................................24-8
IP Multicast.....................................................1-5
IP Packet .....................................................24-11
IP Pool..................................................... 5-4, 5-5
IP Pool Setup...................................................5-2
IP Ports..........................................................11-3
IP Spoofing ......................................... 11-4, 11-7
IP Static Route ..............................................21-7
IP Static Route Setup ....................................21-8
K
Key Fields For Configuring Rules ................12-3
L
LAN IP Address................................ 15-8, 15-10
LAN Setup ......................................................5-1
LAN to WAN Rules......................................12-4
LAND ................................................. 11-4, 11-5
Link type .......................................................27-2
Local ...............................................................9-1
Log and Trace ...............................................27-5
Log Descriptions ............................................O-1
Log Facility ...................................................27-7
Logging Option ................................. 24-8, 24-12
Logs...............................................................15-1
M
MAC Address
Cloning Recommendation.........................18-5
MAC Address Filter Action ................ 7-8, 19-10
MAC Address Filtering......................... 7-6, 19-9
Main Menu....................................................17-5