beautypg.com

ZyXEL Communications NBG410W3G User Manual

Page 17

background image

Table of Contents

NBG410W3G Series User’s Guide

17

15.1.2 System Timeout ..................................................................................................... 260

15.2 WWW (HTTP and HTTPS) ............................................................................................. 260
15.3 WWW .............................................................................................................................. 261
15.4 HTTPS Example .............................................................................................................. 263

15.4.1 Internet Explorer Warning Messages ..................................................................... 263
15.4.2 Netscape Navigator Warning Messages ................................................................ 263
15.4.3 Avoiding the Browser Warning Messages .............................................................. 264
15.4.4 Login Screen .......................................................................................................... 265

15.5 SSH ............................................................................................................................... 267
15.6 How SSH Works .............................................................................................................. 267
15.7 SSH Implementation on the ZyXEL Device ..................................................................... 268

15.7.1 Requirements for Using SSH ................................................................................. 268

15.8 Configuring SSH .............................................................................................................. 269
15.9 Secure Telnet Using SSH Examples ............................................................................... 270

15.9.1 Example 1: Microsoft Windows .............................................................................. 270
15.9.2 Example 2: Linux .................................................................................................... 270

15.10 Secure FTP Using SSH Example .................................................................................. 271
15.11 Telnet ............................................................................................................................ 272
15.12 Configuring TELNET ..................................................................................................... 272
15.13 FTP .............................................................................................................................. 273
15.14 SNMP .......................................................................................................................... 274

15.14.1 Supported MIBs .................................................................................................. 275
15.14.2 SNMP Traps ......................................................................................................... 276
15.14.3 REMOTE MANAGEMENT: SNMP ....................................................................... 276

15.15 DNS ............................................................................................................................. 277
15.16 Introducing Vantage CNM ............................................................................................. 278
15.17 Configuring CNM ........................................................................................................... 278

15.17.1 Additional Configuration for Vantage CNM .......................................................... 280

Chapter 16
UPnP ...................................................................................................................................... 281

16.1 Universal Plug and Play Overview ................................................................................. 281

16.1.1 How Do I Know If I'm Using UPnP? ....................................................................... 281
16.1.2 NAT Traversal ........................................................................................................ 281
16.1.3 Cautions with UPnP ............................................................................................... 281
16.1.4 UPnP and ZyXEL ................................................................................................... 282

16.2 Configuring UPnP ............................................................................................................ 282
16.3 Displaying UPnP Port Mapping .................................................................................... 283
16.4 Installing UPnP in Windows Example .............................................................................. 284

16.4.1 Installing UPnP in Windows Me ............................................................................. 285
16.4.2 Installing UPnP in Windows XP ............................................................................. 286

16.5 Using UPnP in Windows XP Example ............................................................................. 286

16.5.1 Auto-discover Your UPnP-enabled Network Device .............................................. 287