Intrusion Attacks
176
External Access
176
Port Scanning
177
IP Spoofing
177
Trojan Horse Attacks
177
14
N
ETWORKING
C
ONCEPTS
Introduction to TCP/IP
179
IP and TCP
179
IP Addressing
179
Network Address Translation (NAT)
182
Limitations of Using NAT
182
Dynamic Host Configuration Protocol (DHCP)
183
Port Numbers
184
Well Known Port Numbers
184
Registered Port Numbers
184
Private Port Numbers
184
Virtual Private Network Services
184
Introduction to Virtual Private Networks
185
VPN Applications
185
Basic VPN Terms and Concepts
186
V
A
PPENDICES
A
S
AFETY
I
NFORMATION
Important Safety Information
193
Wichtige Sicherheitshinweise
194
Consignes Importantes de Sécurité
195
B
T
ECHNICAL
S
PECIFICATIONS AND
S
TANDARDS
C
C
ABLE
S
PECIFICATIONS
Cable Specifications
199
Pinout Diagrams
199
DUA1611-0AAA02.book Page 9 Thursday, August 2, 2001 4:01 PM
Summary of Contents for SUPERSTACK 3CR16110-95
Page 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM...
Page 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM...
Page 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM...
Page 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM...
Page 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM...
Page 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM...
Page 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM...
Page 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM...
Page 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM...
Page 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM...