Threat Management ...........................................................................................244
To protect computer networks against virus intrusions and attacks
from Internet ............................................................................................245
To Control IM/P2P Applications Usage to Increase Employee
Productivity ..............................................................................................251
To filter non-work related and unproductive web surfing to mitigate
spyware and phishing threats .................................................................256
Threat Reports....................................................................................................271
FAQ ...........................................................................................................................281
A. Product FAQ .................................................................................................281
A04. What is PPPoE? ..............................................................................281
A06. How do I know I am using PPPoE? ..............................................282
A11. What is the difference between the internal IP and the real IP
from my ISP?............................................................................................282
A13. Is it possible to access a server running behind NAT from the
outside Internet? If possible, how?.........................................................283
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 35 Support Notes
3