ZyXEL Communications ADSL 2+ Gateway P-660HW-T1 User Manual page 13

Adsl 2+ gateway
Hide thumbs Also See for ADSL 2+ Gateway P-660HW-T1:
Table of Contents

Advertisement

P-660H/HW/W-T Series User' Guide
7.4 Selecting the NAT Mode .................................................................................107
7.5 Configuring SUA Server Set ...........................................................................108
7.6 Configuring Address Mapping Rules ...............................................................110
7.7 Editing an Address Mapping Rule ................................................................... 111
Dynamic DNS Setup............................................................................................. 114
8.1 Dynamic DNS Overview .................................................................................114
8.2 Configuring Dynamic DNS ..............................................................................114
Time and Date....................................................................................................... 116
9.1 Configuring Time and Date .............................................................................116
Firewalls................................................................................................................ 118
10.1 Firewall Overview ..........................................................................................118
10.2 Types of Firewalls ..........................................................................................118
10.3 Introduction to ZyXEL's Firewall .....................................................................119
10.4 Denial of Service ............................................................................................120
10.5 Stateful Inspection ..........................................................................................124
10.6 Guidelines for Enhancing Security with Your Firewall ....................................127
10.7 Packet Filtering Vs Firewall ............................................................................129
13
8.1.1 DYNDNS Wildcard ..................................................................................114
10.2.1 Packet Filtering Firewalls ......................................................................118
10.2.2 Application-level Firewalls ....................................................................119
10.2.3 Stateful Inspection Firewalls ................................................................119
10.3.1 Denial of Service Attacks ......................................................................120
10.4.1 Basics ...................................................................................................120
10.4.2 Types of DoS Attacks ...........................................................................121
10.4.2.1 ICMP Vulnerability ......................................................................123
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................123
10.4.2.3 Traceroute ...................................................................................124
10.5.1 Stateful Inspection Process ..................................................................125
10.5.2 Stateful Inspection and the Prestige .....................................................126
10.5.3 TCP Security .........................................................................................126
10.5.4 UDP/ICMP Security ..............................................................................127
10.5.5 Upper Layer Protocols ..........................................................................127
10.6.1 Security In General ...............................................................................128
10.7.1 Packet Filtering: ....................................................................................129
10.7.1.1 When To Use Filtering .................................................................129
10.7.2 Firewall .................................................................................................129
10.7.2.1 When To Use The Firewall ..........................................................129
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents