ZyAIR G-2000 Plus User’s Guide

12.3

Configuring Telnet ..........................................................................................

158

12.4

Configuring TELNET ......................................................................................

159

12.5

Configuring FTP .............................................................................................

160

12.6 SNMP .............................................................................................................

161

12.6.1 Supported MIBs ....................................................................................

162

12.6.2 SNMP Traps .........................................................................................

162

12.6.3 Configuring SNMP ................................................................................

163

12.7

Configuring DNS ............................................................................................

165

12.8

Configuring Security .......................................................................................

166

Chapter 13

 

 

UPnP......................................................................................................................

168

13.1

Universal Plug and Play Overview ................................................................

168

13.1.1 How Do I Know If I'm Using UPnP? ......................................................

168

13.1.2 NAT Traversal .......................................................................................

168

13.1.3 Cautions with UPnP ..............................................................................

168

13.2 UPnP and ZyXEL ...........................................................................................

169

13.3

Configuring UPnP ..........................................................................................

169

13.4

Installing UPnP in Windows Example ............................................................

170

13.4.1 Installing UPnP in Windows Me ............................................................

171

13.4.2 Installing UPnP in Windows XP ............................................................

172

13.5

Using UPnP in Windows XP Example ...........................................................

173

13.5.1 Auto-discover Your UPnP-enabled Network Device .............................

174

13.5.2 Web Configurator Easy Access ............................................................

175

13.5.3 Web Configurator Easy Access ............................................................

176

Chapter 14

 

 

Firewalls................................................................................................................

178

14.1

Firewall Overview ...........................................................................................

178

14.2

Types of Firewalls ..........................................................................................

178

14.2.1 Packet Filtering Firewalls ......................................................................

178

14.2.2 Application-level Firewalls ....................................................................

178

14.2.3 Stateful Inspection Firewalls .................................................................

179

14.3

Introduction to ZyXEL’s Firewall .....................................................................

179

14.4

Denial of Service ............................................................................................

180

14.4.1 Basics ...................................................................................................

180

14.4.2 Types of DoS Attacks ...........................................................................

181

 

14.4.2.1 ICMP Vulnerability ......................................................................

184

 

14.4.2.2 Traceroute ...................................................................................

184

14.5

Stateful Inspection ..........................................................................................

185

14.5.1 Stateful Inspection Process ..................................................................

185

14.5.2 Stateful Inspection and the ZyAIR ........................................................

186

14.5.3 TCP Security .........................................................................................

187

13

Table of Contents