ZyXEL Communications P-660H-TX User Manual
P-660h-tx v2 series
Table of contents
Document Outline
- 1. What is ZyNOS?
- 4. How do I update the firmware and configuration file?
- 5. How do I upgrade/backup the ZyNOS firmware by using TFTP
- 6. How do I restore P-660H-Tx v2 configurations by using TFT
- 7. What should I do if I forget the system password?
- 8. How to use the Reset button?
- 9. What is SUA? When should I use SUA?
- 10. What is the difference between SUA and Full Feature NAT?
- 12. When do I need select Full Feature NAT?
- 13. What IP/Port mapping does Multi-NAT support?
- 14. How many network users can the SUA/NAT support?
- 15. What are Device filters and Protocol filters?
- 16. How can I protect against IP spoofing attacks?
- 2. What is the default password for Web Configurator?
- 3. What’s the difference between ‘Common User Account’ and ‘
- 4. How do I know the P-660H-Tx v2's WAN IP address assigned
- 5. What is the micro filter or splitter used for?
- 6. The P-660H-Tx v2 supports Bridge and Router mode, what's
- 7. How do I know I am using PPPoE?
- 8. Why does my provider use PPPoE?
- 9. What is DDNS?
- 10. When do I need DDNS service?
- 11. What is DDNS wildcard? Does the P-660H-Tx v2 support DDN
- 12. Can the P-660H-Tx v2's SUA handle IPSec packets sent by
- 13. How do I setup my P-660H-Tx v2 for routing IPSec packets
- 14. What is Traffic Shaping?
- 15. Why do we perform traffic shaping in the P-660H-Tx v2?
- 16. What do the parameters (PCR, SCR, MBS) mean?
- 8. What are the signaling pins of the ADSL connector?
- 1. What is a network firewall?
- 2. What makes P-660H-Tx v2 secure?
- 3. What are the basic types of firewalls?
- 4. What kind of firewall is the P-660H-Tx v2?
- 5. Why do you need a firewall when your router has packet fi
- 6. What is Denials of Service (DoS) attack?
- 7. What is Ping of Death attack?
- 8. What is Teardrop attack?
- 9. What is SYN Flood attack?
- 10. What is LAND attack?
- 11 What is Brute-force attack?
- 12. What is IP Spoofing attack?
- 13. What are the default ACL firewall rules in P-660H-Tx v2?
- Configuration
- Log and Alert
- 2. What does the log show to us?
- 3. How do I view the firewall log?
- 4. When does the P-660H-Tx v2 generate the firewall alert?
- 5. What is the difference between the log and alert?
- 1. Internet Access Using P-660H-Tx v2 under Bridge mode
- 2. Internet Access Using P-660H-Tx v2 under Routing mode
- 3. Setup the P-660H-Tx v2 as a DHCP Relay
- 4. SUA Notes
- 5. Using Full Feature NAT
- 6. Using the Dynamic DNS (DDNS)
- 7. Network Management Using SNMP
- 9. Using IP Alias
- 10. Using IP Policy Routing
- 11. Using Call Scheduling
- 12. Using IP Multicast
- Online Trace
- Offline Trace