ZyAIR G-2000 Plus User’s Guide
12.3
Configuring Telnet ..........................................................................................
158
12.4
Configuring TELNET ......................................................................................
159
12.5
Configuring FTP .............................................................................................
160
12.6 SNMP .............................................................................................................
161
12.6.1 Supported MIBs ....................................................................................
162
12.6.2 SNMP Traps .........................................................................................
12.6.3 Configuring SNMP ................................................................................
163
12.7
Configuring DNS ............................................................................................
165
12.8
Configuring Security .......................................................................................
166
Chapter 13
UPnP......................................................................................................................
168
13.1
Universal Plug and Play Overview ................................................................
13.1.1 How Do I Know If I'm Using UPnP? ......................................................
13.1.2 NAT Traversal .......................................................................................
13.1.3 Cautions with UPnP ..............................................................................
13.2 UPnP and ZyXEL ...........................................................................................
169
13.3
Configuring UPnP ..........................................................................................
13.4
Installing UPnP in Windows Example ............................................................
170
13.4.1 Installing UPnP in Windows Me ............................................................
171
13.4.2 Installing UPnP in Windows XP ............................................................
172
13.5
Using UPnP in Windows XP Example ...........................................................
173
13.5.1 Auto-discover Your UPnP-enabled Network Device .............................
174
13.5.2 Web Configurator Easy Access ............................................................
175
13.5.3 Web Configurator Easy Access ............................................................
176
Chapter 14
Firewalls................................................................................................................
178
14.1
Firewall Overview ...........................................................................................
14.2
Types of Firewalls ..........................................................................................
14.2.1 Packet Filtering Firewalls ......................................................................
14.2.2 Application-level Firewalls ....................................................................
14.2.3 Stateful Inspection Firewalls .................................................................
179
14.3
Introduction to ZyXEL’s Firewall .....................................................................
14.4
Denial of Service ............................................................................................
180
14.4.1 Basics ...................................................................................................
14.4.2 Types of DoS Attacks ...........................................................................
181
14.4.2.1 ICMP Vulnerability ......................................................................
184
14.4.2.2 Traceroute ...................................................................................
14.5
Stateful Inspection ..........................................................................................
185
14.5.1 Stateful Inspection Process ..................................................................
14.5.2 Stateful Inspection and the ZyAIR ........................................................
186
14.5.3 TCP Security .........................................................................................
187
13
Table of Contents