ZyXEL Communications 2WG User Manual

Page 4

Advertising
background image

ZyWALL 2WG Support Notes

4

gateway behind ZyWALL? .....................................................................226

A28. How do I setup my ZyWALL for routing IPSec packets over

NAT? .........................................................................................................227

A29. What is STP (Spanning Tree Protocol) /RSTP (Rapid STP)? .....227

A30. What is the flow ZyWALL handles inbound and outgoing

traffic?.......................................................................................................227

B. Firewall FAQ.................................................................................................227

B01. What is a network firewall? ...........................................................228

B02. What makes ZyWALL secure?......................................................228

B03. What are the basic types of firewalls?...........................................228

B04. What kind of firewall is the ZyWALL? ........................................229

B05. Why do you need a firewall when your router has packet

filtering and NAT built-in? .....................................................................229

B06. What is Denials of Service (DoS)attack?.......................................229

B07. What is Ping of Death attack?........................................................230

B08. What is Teardrop attack?...............................................................230

B09. What is SYN Flood attack? ............................................................230

B10. What is LAND attack?....................................................................230

B11. What is Brute-force attack? ...........................................................230

B12. What is IP Spoofing attack?...........................................................231

B13. What are the default ACL firewall rules in ZyWALL? ..............231

B14. Why does traffic redirect/static/policy route be blocked by

ZyWALL?.................................................................................................231

B15. How can I protect against IP spoofing attacks? ...........................233

C. Security Service licenses FAQ ......................................................................234

C01. What is iCard? ................................................................................234

C02. Where can I buy the iCard and how much does it cost? .............234

C03. How many kinds of iCard does ZyXEL provide? ........................234

C04. Is each type of iCard device specific?............................................234

C05. What are the available security service licenses which require

additional purchase and license activation in ZyNOS v4.00?..............234

C06. What kind of iCard should I buy?.................................................235

C07. If I violate the mappings described above, for example, using a

silver iCard for ZyWALL 35 or ZyWALL 70, what will happen?.......235

C08. Can I try the Content Filtering service for free? How long is the

free trial period of Content Filtering service?.......................................235

D. Security Service Activation and UpdateFAQ................................................235

D01. Why do I have to register? .............................................................235

All contents copyright (c) 2006 ZyXEL Communications Corporation.

Advertising