P-660HW-Tx v2 Series Support Notes
17. What do the ATM QoS Types (CBR, UBR, VBR-nRT, VBR-RT) mean?
................................................................................................................16
18. What is content filter? .......................................................................17
ADSL FAQ.................................................................................................18
1. How does ADSL compare to Cable modems?....................................18
2. What is the expected throughput?...................................................... 18
3. What is the microfilter used for? .........................................................18
4. How do I know the ADSL line is up?...................................................18
5. How does the P-660HW-Tx v2 work on a noisy ADSL?..................... 18
6. Does the VC-based multiplexing perform better than the LLC-based
multiplexing?...........................................................................................19
7. How do I know the details of my ADSL line statistics?........................19
8. What are the signaling pins of the ADSL connector?..........................19
9. What is triple play? .............................................................................19
Firewall FAQ .............................................................................................21
General...................................................................................................21
1. What is a network firewall?...................................................21
2. What makes P-660HW-Tx v2 secure? .................................21
3. What are the basic types of firewalls?.................................. 21
4. What kind of firewall is the P-660HW-Tx v2? .......................22
5. Why do you need a firewall when your router has packet
filtering and NAT built-in?......................................................... 22
6. What is Denials of Service (DoS) attack?.............................22
7. What is Ping of Death attack?.............................................. 23
8. What is Teardrop attack? .....................................................23
9. What is SYN Flood attack?...................................................23
10. What is LAND attack? ........................................................23
11 What is Brute-force attack? .................................................24
12. What is IP Spoofing attack? ...............................................24
13. What are the default ACL firewall rules in P-660HW-Tx v2?
.................................................................................................24
Configuration ..........................................................................................24
1. How do I configure the firewall? ...........................................24
2. How do I prevent others from configuring my firewall?.........24
3. Why can't I configure my P-660HW-Tx v2 using Web
Configurator/Telnet over WAN? ...............................................25
4. Why can't I upload the firmware and configuration file using
FTP over WAN? .......................................................................26
Log and Alert ..........................................................................................27
1. When does the P-660HW-Tx v2 generate the firewall log?.. 27
2. What does the log show to us? ............................................27
3. How do I view the firewall log? .............................................27
4. When does the P-660HW-Tx v2 generate the firewall alert?28
5. What is the difference between the log and alert?................28
2
All contents copyright © 2006 ZyXEL Communications Corporation.