ZyAIR G-2000 Plus User’s Guide
13 Table of Contents
12.3 Configuring Telnet ..........................................................................................158
12.4 Configuring TELNET ......................................................................................159
12.5 Configuring FTP .............................................................................................160
12.6 SNMP .............................................................................................................161
12.6.1 Supported MIBs ....................................................................................162
12.6.2 SNMP Traps .........................................................................................162
12.6.3 Configuring SNMP ................................................................................163
12.7 Configuring DNS ............................................................................................165
12.8 Configuring Security .......................................................................................166
Chapter 13
UPnP...................................................................................................................... 168
13.1 Universal Plug and Play Overview ................................................................168
13.1.1 How Do I Know If I'm Using UPnP? ......................................................168
13.1.2 NAT Traversal .......................................................................................168
13.1.3 Cautions with UPnP ..............................................................................168
13.2 UPnP and ZyXEL ...........................................................................................169
13.3 Configuring UPnP ..........................................................................................169
13.4 Installing UPnP in Windows Example ............................................................170
13.4.1 Installing UPnP in Windows Me ............................................................171
13.4.2 Installing UPnP in Windows XP ............................................................172
13.5 Using UPnP in Windows XP Example ...........................................................173
13.5.1 Auto-discover Your UPnP-enabled Network Device .............................174
13.5.2 Web Configurator Easy Access ............................................................175
13.5.3 Web Configurator Easy Access ............................................................176
Chapter 14
Firewalls................................................................................................................ 178
14.1 Firewall Overview ...........................................................................................178
14.2 Types of Firewalls ..........................................................................................178
14.2.1 Packet Filtering Firewalls ......................................................................178
14.2.2 Application-level Firewalls ....................................................................178
14.2.3 Stateful Inspection Firewalls .................................................................179
14.3 Introduction to ZyXEL’s Firewall .....................................................................179
14.4 Denial of Service ............................................................................................180
14.4.1 Basics ...................................................................................................180
14.4.2 Types of DoS Attacks ...........................................................................181
14.4.2.1 ICMP Vulnerability ......................................................................184
14.4.2.2 Traceroute ...................................................................................184
14.5 Stateful Inspection ..........................................................................................185
14.5.1 Stateful Inspection Process ..................................................................185
14.5.2 Stateful Inspection and the ZyAIR ........................................................186
14.5.3 TCP Security .........................................................................................187