
Index
ZyWALL P1 User’s Guide
504
monitor 235, 413
safety warnings 6
scanner types 192
searching for IDP signatures 181
secure FTP using SSH 309
secure management 297
secure network access for telecommuters 39
secure Telnet using SSH 308
security associations. See VPN.
security settings for VPN traffic 91
service type 164
services
subscription 101
Session Initiation Protocol. See SIP.
severity levels of intrusions 178
shadow firewall
See transparent firewall.
signature categories
access control 177
backdoor/trojan 177
buffer overflow 177
IM 178
P2P 178
scan 177
virus/worm 178
Simple Network Management Protocol. See SNMP.
Simple Traversal of User Datagram Protocol (UDP)
through Network Address Translators. See STUN.
Single User Account. See SUA.
SIP 334
ALG 331
RTP 332
skip VPN overlap 221
SNMP 312
Get 313
GetNext 313
manager 313
MIB 313
Set 313
Trap 313
troubleshooting 422
source address 159
Spanning Tree Protocol (STP) 119
Spanning Tree Protocol. See STP.
SQL Slammer 173
SSH 305
how SSH works 305
implementation 306
stateful inspection firewall 141
static route 293
stealth firewall
See transparent firewall.
STP 119, 120, 121
BPDU 121
Hello BPDU 121
how it works 121
Max Age 121
port states 121
STUN 334
subnet 455
subnet mask 456
subnetting 458
subscription services 101
SYN scanning 177
syntax conventions 4
system
name 375
timeout 298
T
task bar properties 468
TCP maximum incomplete 163
telecommuter 39
Telnet 310
TFTP
file upload 398
over WAN 389
TFTP restrictions 389
threshold 162
time 378
Daylight Saving Time 380
resetting 381
synchronization with server 381
zone 380
Time protocol 380
time protocol 380
Daytime 380
NTP 380
Time 380
timeout
system 298
To VPN traffic 92
trademarks 489
traffic
from VPN 91
to VPN 92
transparent bridge 382
transparent firewall 53, 121, 383, 385
triangle routes 150
vs. virtual interfaces 150
trigger a VPN tunnel 89, 233
trojan horse 177
troubleshooting 399, 419