Encryption ................................. 60, 61
Encryption algorithm ................. 53, 56
Encryption method .................... 54, 58
Environment .............................. 13, 27
Environmental Protection ................ 12
Ethernet ........................................... 18
Explosive atmosphere ..................... 10
Exposed host ................................... 50
External network ............................. 41
Filter list ........................................... 76
Fire hazard ....................................... 13
Firewall ............ 25, 47, 48, 52, 76, 104
Firmware ................................... 83, 84
Firmware checksum ........................ 80
Firmware Update............................. 26
Firmware version ............................. 80
Floating ........................................... 53
Formatting ......................................... 9
Fragmenting size ....................... 54, 58
Gateway .................................. 73, 104
General safety instructions .............. 13
GPRS ............................................. 104
GRE ........................................... 24, 67
GRE protocol ................................... 60
Ground ............................................ 22
GSM .............................................. 105
Hardware reset ................................ 82
Hardware revision ........................... 80
Host name ....................................... 37
Host table ........................................ 37
Housing ........................................... 14
HTTP ................................................ 26
HTTPS ....................................... 26, 34
Humidity .......................................... 18
ICMP ............................................. 105
ICMP ping ................................. 62, 87
Idle time .............................. 24, 42, 44
Intended Use ................................... 10
Internal clock ................................... 81
Internal network .............................. 41
IP address ... 32, 36, 61, 64, 72, 73, 76,
105
IP address range .............................. 73
IP forwarding ............................. 24, 48
IP packet ......................................... 87
IP rating ........................................... 18
IPsec .................................... 24, 51, 63
IPsec authentication ........................ 24
IPsec connection ............................. 65
IPsec tunnel ..................................... 63
IPT ............................................. 25, 76
IPT connection ................................ 77
IPT master ....................................... 76
IPT Slave .......................................... 76
IPv6 ................................................. 23
IPv6 address .................................... 42
ISP ................................................. 105
Key renegotiation ................ 54, 58, 65
Key word ........................................... 8
LAN ............................................... 105
LAN ext interface ...................... 41, 42
Lease Time ...................................... 73
Leased line ...................................... 23
Leased line operation ...................... 23
Link LED .................................... 19, 20
Liquids ....................................... 13, 27
Log File ...................................... 26, 86
LZO compression ................ 53, 56, 57
MAC address ..................... 36, 38, 105
MAC filter .................................. 25, 38
Main mode ...................................... 64
Management Information Base . 70, 78
Marking ............................................. 8
Maximum connect time .................. 42
MCIP ......................................... 26, 79
Menu ............................................... 33
Messages ........................................ 68
MIB ............................................ 70, 78
Modification .............................. 13, 89
Moisture .................................... 13, 27
Monitoring ....................................... 88