ZyXEL P-794H User Guide - Page 15

IGMP Snooping, Quality of Service QoS, Security

Page 15 highlights

Table of Contents 12.2 The SNTP Client Screen 156 Chapter 13 IGMP Snooping ...159 13.1 Overview ...159 13.1.1 What You Need to Know 159 13.2 The IGMP Snooping Screen 160 Chapter 14 Quality of Service (QoS)...163 14.1 Overview ...163 14.1.1 What You Need to Know 163 14.2 The Classifier Configuration Screen 165 14.2.1 Edit QoS Classifier 166 14.3 The Meter Configuration Screen 167 14.4 The ALD Configuration Screen 168 14.5 The Scheduler Configuration Screen 169 14.5.1 Edit a Priority Queuing Scheduler Profile 171 14.5.2 Edit a Fair Weight Queuing Scheduler Profile 171 14.6 Transport Classifier & Scheduler Configuration 172 14.7 Technical Reference ...173 14.7.1 DiffServ ...173 14.7.2 IEEE 802.1Q Tag 174 14.7.3 Token Bucket ...174 14.7.4 Single Rate Three Color Marker 175 14.7.5 Two Rate Three Color Marker 176 14.7.6 QoS Meter Types 176 Chapter 15 Security...179 15.1 Overview ...179 15.1.1 What You Need to Know 179 15.2 The Security Interface Configuration Screen 180 15.2.1 Security State and Level 180 15.2.2 Add Security Interface 182 15.2.3 Edit Security Interface 182 15.2.4 Policies, Triggers, Intrusion Detection, Logging 186 15.3 Technical Reference ...194 15.3.1 NAT Definitions ...194 15.3.2 What NAT Does ...195 15.3.3 How NAT Works ...195 15.3.4 Port Scanning ...196 15.3.5 ICMP Flood Attack 196 P-794H User's Guide 15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294

Table of Contents
P-794H User’s Guide
15
12.2 The SNTP Client Screen
.................................................................................................
156
Chapter
13
IGMP Snooping
.....................................................................................................................
159
13.1 Overview
..........................................................................................................................
159
13.1.1 What You Need to Know
........................................................................................
159
13.2 The IGMP Snooping Screen
............................................................................................
160
Chapter
14
Quality of Service (QoS)
.......................................................................................................
163
14.1 Overview
..........................................................................................................................
163
14.1.1 What You Need to Know
........................................................................................
163
14.2 The Classifier Configuration Screen
...............................................................................
165
14.2.1 Edit QoS Classifier
.................................................................................................
166
14.3 The Meter Configuration Screen
.....................................................................................
167
14.4 The ALD Configuration Screen
........................................................................................
168
14.5 The Scheduler Configuration Screen
..............................................................................
169
14.5.1 Edit a Priority Queuing Scheduler Profile
...............................................................
171
14.5.2 Edit a Fair Weight Queuing Scheduler Profile
........................................................
171
14.6 Transport Classifier & Scheduler Configuration
...............................................................
172
14.7 Technical Reference
........................................................................................................
173
14.7.1 DiffServ
..................................................................................................................
173
14.7.2 IEEE 802.1Q Tag
...................................................................................................
174
14.7.3 Token Bucket
..........................................................................................................
174
14.7.4 Single Rate Three Color Marker
............................................................................
175
14.7.5 Two Rate Three Color Marker
................................................................................
176
14.7.6 QoS Meter Types
...................................................................................................
176
Chapter
15
Security
..................................................................................................................................
179
15.1 Overview
..........................................................................................................................
179
15.1.1 What You Need to Know
........................................................................................
179
15.2 The Security Interface Configuration Screen
...................................................................
180
15.2.1 Security State and Level
........................................................................................
180
15.2.2 Add Security Interface
............................................................................................
182
15.2.3 Edit Security Interface
............................................................................................
182
15.2.4 Policies, Triggers, Intrusion Detection, Logging
.....................................................
186
15.3 Technical Reference
........................................................................................................
194
15.3.1 NAT Definitions
......................................................................................................
194
15.3.2 What NAT Does
.....................................................................................................
195
15.3.3 How NAT Works
.....................................................................................................
195
15.3.4 Port Scanning
.........................................................................................................
196
15.3.5 ICMP Flood Attack
.................................................................................................
196