ZyXEL Communications P-660H-TX Support Notes page 3

Adsl2+ 4-port gateway
Table of Contents

Advertisement

................................................................................................................14
18. What is content filter? .......................................................................15
ADSL FAQ .................................................................................................16
1. How does ADSL compare to Cable modems?....................................16
2. What is the expected throughput? ......................................................16
3. What is the microfilter used for? .........................................................16
4. How do I know the ADSL line is up?...................................................17
multiplexing?...........................................................................................17
9. What is triple play? .............................................................................17
Firewall FAQ .............................................................................................19
General ...................................................................................................19
1. What is a network firewall?...................................................19
2. What makes P-660H-Tx v2 secure?.....................................19
3. What are the basic types of firewalls? ..................................19
4. What kind of firewall is the P-660H-Tx v2?...........................20
filtering and NAT built-in? .........................................................20
6. What is Denials of Service (DoS) attack?.............................20
7. What is Ping of Death attack? ..............................................21
8. What is Teardrop attack? .....................................................21
9. What is SYN Flood attack?...................................................21
10. What is LAND attack? ........................................................21
11 What is Brute-force attack? .................................................22
12. What is IP Spoofing attack? ...............................................22
1. How do I configure the firewall? ...........................................22
Configurator/Telnet over WAN? ...............................................23
FTP over WAN? .......................................................................24
Log and Alert ..........................................................................................25
2. What does the log show to us? ............................................25
3. How do I view the firewall log? .............................................25
Application Notes.....................................................................................27
All contents copyright © 2006 ZyXEL Communications Corporation.
P-660H-Tx v2 Support Notes
2

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-660h-tx v2 series

Table of Contents