Zyxel-communications 5 Series Bedienungsanleitung Seite 48

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 835
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 47
ZyWALL 5/35/70 Series User’s Guide
48 List of Tables
Table 125 Services and Port Numbers ............................................................................... 405
Table 126 ADVANCED > NAT > Port Forwarding .............................................................. 408
Table 127 ADVANCED > NAT > Port Triggering ................................................................ 410
Table 128 ADVANCED > STATIC ROUTE > IP Static Route ............................................. 414
Table 129 ADVANCED > STATIC ROUTE > IP Static Route > Edit ................................... 415
Table 130 ADVANCED > POLICY ROUTE > Policy Route Summary ............................... 419
Table 131 ADVANCED > POLICY ROUTE > Edit .............................................................. 420
Table 132 Application and Subnet-based Bandwidth Management Example .................... 425
Table 133 Maximize Bandwidth Usage Example ............................................................... 426
Table 134 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ....... 427
Table 135 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example .... 427
Table 136 Bandwidth Borrowing Example .......................................................................... 428
Table 137 Over Allotment of Bandwidth Example .............................................................. 429
Table 138 ADVANCED > BW MGMT > Summary ............................................................. 430
Table 139 ADVANCED > BW MGMT > Class Setup ......................................................... 432
Table 140 ADVANCED > BW MGMT > Class Setup > Add Sub-Class ............................. 434
Table 141 Services and Port Numbers ............................................................................... 436
Table 142 ADVANCED > DNS > Add (Address Record) ................................................... 443
Table 143 ADVANCED > REMOTE MGMT > WWW ......................................................... 454
Table 144 ADVANCED > REMOTE MGMT > SSH ............................................................ 462
Table 145 ADVANCED > REMOTE MGMT > Telnet .......................................................... 466
Table 146 ADVANCED > REMOTE MGMT > FTP ............................................................ 467
Table 147 SNMP Traps ...................................................................................................... 469
Table 148 ADVANCED > REMOTE MGMT > SNMP ......................................................... 470
Table 149 ADVANCED > REMOTE MGMT > DNS ............................................................ 471
Table 150 ADVANCED > REMOTE MGMT > CNM ........................................................... 472
Table 151 ADVANCED > UPnP ......................................................................................... 476
Table 152 ADVANCED > UPnP > Ports ............................................................................. 478
Table 153 ADVANCED > ALG ............................................................................................ 490
Table 154 REPORTS > SYSTEM REPORTS .................................................................... 492
Table 155 REPORTS > SYSTEM REPORTS: Web Site Hits Report ................................. 493
Table 156 REPORTS > SYSTEM REPORTS: Host IP Address ........................................ 494
Table 157 REPORTS > SYSTEM REPORTS: Protocol/ Port ............................................ 495
Table 158 Report Specifications ......................................................................................... 496
Table 159 REPORTS > THREAT REPORTS > IDP ........................................................... 497
Table 160 REPORTS > THREAT REPORTS > Anti-Virus ................................................. 499
Table 161 REPORTS > THREAT REPORTS > Anti-Spam ................................................ 500
Table 162 LOGS > View Log .............................................................................................. 504
Table 163 Log Description Example ................................................................................... 504
Table 164 LOGS > Log Settings ........................................................................................ 508
Table 165 System Maintenance Logs ................................................................................ 509
Table 166 System Error Logs ............................................................................................. 511
Table 167 Access Control Logs .......................................................................................... 511
Seitenansicht 47
1 2 ... 43 44 45 46 47 48 49 50 51 52 53 ... 834 835

Kommentare zu diesen Handbüchern

Keine Kommentare