ZyXEL Communications P-660HW-Tx v3 Support Notes page 3

802.11g wireless adsl2+ 4-port gateway
Hide thumbs Also See for P-660HW-Tx v3:
Table of Contents

Advertisement

.......................................................................................................... 15
16. What is content filter? .................................................................... 16
.......................................................................................... 17
1. How does ADSL compare to Cable modems? .................................. 17
2. What is the expected throughput? .................................................... 17
3. What is the microfilter used for? ....................................................... 17
4. How do I know the ADSL line is up? ................................................ 17
multiplexing? ...................................................................................... 18
9. What is triple play? .......................................................................... 18
....................................................................................... 20
General .............................................................................................. 20
1. What is a network firewall? ................................................ 20
2. What makes P-660HW-Tx v3 secure? ................................ 20
3. What are the basic types of firewalls?................................. 20
filtering and NAT built-in? ...................................................... 21
6. What is Denials of Service (DoS) attack? ........................... 21
7. What is Ping of Death attack? ............................................ 22
8. What is Teardrop attack? ................................................... 22
9. What is SYN Flood attack? ................................................ 22
10. What is LAND attack? ...................................................... 22
11 What is Brute-force attack? ............................................... 23
12. What is IP Spoofing attack? ............................................. 23
............................................................................................. 23
Configuration ...................................................................................... 23
1. How do I configure the firewall? ......................................... 23
Configurator/Telnet over WAN? ............................................. 24
FTP over WAN? .................................................................... 25
Log and Alert ...................................................................................... 26
2. What does the log show to us? .......................................... 26
All contents copyright © 2008 ZyXEL Communications Corporation.
P-660HW-Tx v3 Series Support Notes
3

Advertisement

Table of Contents
loading

Table of Contents