
Index
ISG50 User’s Guide866
authenticating clients 679
avoiding warning messages 687
example 687
vs HTTP 679
with Internet Explorer 687
hunt group 562
HyperText Transfer Protocol over Secure Socket
Layer, see HTTPS
I
ICMP 619
datagram length 427
decoder 418, 425
echo 423
flood attack 423
portsweep 422
Time Stamp header length 427
unreachables 422
IEEE 802.1q VLAN
IGP (Interior Gateway Protocol) 421
IIS
backslash-evasion attack 425
emulation 425
encoding 425
server 425
unicode 425
unicode-codepoint-encoding attack 425
IKE SA
aggressive mode 386, 389, 390
and certificates 391
and RADIUS 391
and to-Device firewall 770
authentication algorithms 387
content 389
Dead Peer Detection (DPD) 385
Diffie-Hellman key group 388
encryption algorithms 387
extended authentication 391
ID type 389
IP address, remote IPSec router 386
IP address, ZyXEL device 386
local identity 389
main mode 386, 389, 390
NAT traversal 390
negotiation mode 386
password 391
peer identity 389
pre-shared key 389
proposal 387
see also VPN
user name 391
import phonebook 588
inbound calls, and auto-attendant 503, 504
incoming bandwidth 256
incoming calls
handling 595
second call 532
transferring
532
ingress bandwidth 256
inline profile 415
Integrated Services Digital Network
see ISDN
interconnected VoIP 532
interface
status 188, 199
troubleshooting 766
types 92
interfaces 92, 107, 233
and DNS servers 278
and HTTP redirect 334
and layer-3 virtualization 234
and NAT 326
and physical ports 92, 233
and policy routes 296
and static routes 298
and VPN gateways 370
and zones 92, 234
as DHCP relays 278
as DHCP servers 278, 666
backup, see trunks
bandwidth management 277, 288
bridge, see also bridge interfaces.
cellular 234
configuration overview 98
default configuration 93
DHCP clients 276
Ethernet, see also Ethernet interfaces.
gateway 277
general characteristics 233
IP address 276
metric 277
MTU 277
overlapping IP address and subnet mask 276
port groups, see also port groups.