beautypg.com

ZyXEL Communications G-2000 Plus User Manual

Page 14

background image

ZyAIR G-2000 Plus User’s Guide

13

Table of Contents

12.3 Configuring Telnet ..........................................................................................158
12.4 Configuring TELNET ......................................................................................159
12.5 Configuring FTP .............................................................................................160
12.6 SNMP .............................................................................................................161

12.6.1 Supported MIBs ....................................................................................162
12.6.2 SNMP Traps .........................................................................................162
12.6.3 Configuring SNMP ................................................................................163

12.7 Configuring DNS ............................................................................................165
12.8 Configuring Security .......................................................................................166

Chapter 13
UPnP......................................................................................................................
168

13.1 Universal Plug and Play Overview ................................................................168

13.1.1 How Do I Know If I'm Using UPnP? ......................................................168
13.1.2 NAT Traversal .......................................................................................168
13.1.3 Cautions with UPnP ..............................................................................168

13.2 UPnP and ZyXEL ...........................................................................................169
13.3 Configuring UPnP ..........................................................................................169
13.4 Installing UPnP in Windows Example ............................................................170

13.4.1 Installing UPnP in Windows Me ............................................................171
13.4.2 Installing UPnP in Windows XP ............................................................172

13.5 Using UPnP in Windows XP Example ...........................................................173

13.5.1 Auto-discover Your UPnP-enabled Network Device .............................174
13.5.2 Web Configurator Easy Access ............................................................175
13.5.3 Web Configurator Easy Access ............................................................176

Chapter 14
Firewalls................................................................................................................
178

14.1 Firewall Overview ...........................................................................................178
14.2 Types of Firewalls ..........................................................................................178

14.2.1 Packet Filtering Firewalls ......................................................................178
14.2.2 Application-level Firewalls ....................................................................178
14.2.3 Stateful Inspection Firewalls .................................................................179

14.3 Introduction to ZyXEL’s Firewall .....................................................................179
14.4 Denial of Service ............................................................................................180

14.4.1 Basics ...................................................................................................180
14.4.2 Types of DoS Attacks ...........................................................................181

14.4.2.1 ICMP Vulnerability ......................................................................184
14.4.2.2 Traceroute ...................................................................................184

14.5 Stateful Inspection ..........................................................................................185

14.5.1 Stateful Inspection Process ..................................................................185
14.5.2 Stateful Inspection and the ZyAIR ........................................................186
14.5.3 TCP Security .........................................................................................187