beautypg.com

ZyXEL Communications 5 Series User Manual

Page 22

background image

ZyWALL 5/35/70 Series User’s Guide

22

Table of Contents

26.4.2 Netscape Navigator Warning Messages ...............................................456

26.4.3 Avoiding the Browser Warning Messages ............................................457

26.4.4 Login Screen .........................................................................................457

26.5 SSH .............................................................................................................459

26.6 How SSH Works ............................................................................................460

26.7 SSH Implementation on the ZyWALL .............................................................461

26.7.1 Requirements for Using SSH ................................................................461

26.8 Configuring SSH ............................................................................................461

26.9 Secure Telnet Using SSH Examples ..............................................................462

26.9.1 Example 1: Microsoft Windows .............................................................462

26.9.2 Example 2: Linux ..................................................................................463

26.10 Secure FTP Using SSH Example ................................................................464

26.11 Telnet ..........................................................................................................465

26.12 Configuring TELNET ....................................................................................465

26.13 FTP ............................................................................................................466

26.14 SNMP .........................................................................................................467

26.14.1 Supported MIBs .................................................................................469

26.14.2 SNMP Traps .......................................................................................469

26.14.3 REMOTE MANAGEMENT: SNMP ......................................................469

26.15 DNS ............................................................................................................471

26.16 Introducing Vantage CNM ...........................................................................471

26.17 Configuring CNM ..........................................................................................472

Chapter 27
UPnP......................................................................................................................
475

27.1 Universal Plug and Play Overview ...............................................................475

27.1.1 How Do I Know If I'm Using UPnP? ......................................................475

27.1.2 NAT Traversal .......................................................................................475

27.1.3 Cautions with UPnP ..............................................................................475

27.1.4 UPnP and ZyXEL ..................................................................................476

27.2 Configuring UPnP ..........................................................................................476

27.3 Displaying UPnP Port Mapping ...................................................................477

27.4 Installing UPnP in Windows Example ............................................................478

27.4.1 Installing UPnP in Windows Me ............................................................479

27.4.2 Installing UPnP in Windows XP ............................................................480

27.5 Using UPnP in Windows XP Example ...........................................................480

27.5.1 Auto-discover Your UPnP-enabled Network Device .............................481

27.5.2 Web Configurator Easy Access ............................................................482

Chapter 28
ALG Screen...........................................................................................................
485

28.1 ALG Introduction ...........................................................................................485

28.1.1 ALG and NAT ........................................................................................485