ZyWALL 2WG Support Notes
4
gateway behind ZyWALL?.....................................................................226
A28. How do I setup my ZyWALL for routing IPSec packets over
NAT?......................................................................................................... 227
A29. What is STP (Spanning Tree Protocol) /RSTP (Rapid STP)?.....227
A30. What is the flow ZyWALL handles inbound and outgoing
traffic?.......................................................................................................227
B. Firewall FAQ.................................................................................................227
B01. What is a network firewall?........................................................... 228
B02. What makes ZyWALL secure?......................................................228
B03. What are the basic types of firewalls?...........................................228
B04. What kind of firewall is the ZyWALL?........................................ 229
B05. Why do you need a firewall when your router has packet
filtering and NAT built-in?..................................................................... 229
B06. What is Denials of Service (DoS)attack?.......................................229
B07. What is Ping of Death attack?........................................................230
B08. What is Teardrop attack?...............................................................230
B09. What is SYN Flood attack?............................................................ 230
B10. What is LAND attack?....................................................................230
B11. What is Brute-force attack?........................................................... 230
B12. What is IP Spoofing attack?...........................................................231
B13. What are the default ACL firewall rules in ZyWALL?..............231
B14. Why does traffic redirect/static/policy route be blocked by
ZyWALL?.................................................................................................231
B15. How can I protect against IP spoofing attacks?........................... 233
C. Security Service licenses FAQ......................................................................234
C01. What is iCard? ................................................................................234
C02. Where can I buy the iCard and how much does it cost?.............234
C03. How many kinds of iCard does ZyXEL provide?........................234
C04. Is each type of iCard device specific?............................................234
C05. What are the available security service licenses which require
additional purchase and license activation in ZyNOS v4.00?..............234
C06. What kind of iCard should I buy?.................................................235
C07. If I violate the mappings described above, for example, using a
silver iCard for ZyWALL 35 or ZyWALL 70, what will happen?.......235
C08. Can I try the Content Filtering service for free? How long is the
free trial period of Content Filtering service?.......................................235
D. Security Service Activation and UpdateFAQ................................................235
D01. Why do I have to register?............................................................. 235
All contents copyright (c) 2006 ZyXEL Communications Corporation.