ZyXEL Communications P-660H-TX User Manual

Page 3

Advertising
background image

P-660H-Tx v2 Support Notes

17. What do the ATM QoS Types (CBR, UBR, VBR-nRT, VBR-RT) mean?
................................................................................................................14
18. What is content filter? .......................................................................15

ADSL FAQ .................................................................................................16

1. How does ADSL compare to Cable modems?....................................16
2. What is the expected throughput? ......................................................16
3. What is the microfilter used for? .........................................................16
4. How do I know the ADSL line is up?...................................................17
5. How does the P-660H-Tx v2 work on a noisy ADSL?.........................17
6. Does the VC-based multiplexing perform better than the LLC-based
multiplexing?...........................................................................................17
7. How do I know the details of my ADSL line statistics?........................17
8. What are the signaling pins of the ADSL connector?..........................18
9. What is triple play? .............................................................................17

Firewall FAQ .............................................................................................19

General ...................................................................................................19

1. What is a network firewall? ...................................................19
2. What makes P-660H-Tx v2 secure?.....................................19
3. What are the basic types of firewalls? ..................................19
4. What kind of firewall is the P-660H-Tx v2? ...........................20
5. Why do you need a firewall when your router has packet
filtering and NAT built-in? .........................................................20
6. What is Denials of Service (DoS) attack?.............................20
7. What is Ping of Death attack? ..............................................21
8. What is Teardrop attack? .....................................................21
9. What is SYN Flood attack?...................................................21
10. What is LAND attack? ........................................................21
11 What is Brute-force attack? .................................................22
12. What is IP Spoofing attack? ...............................................22
13. What are the default ACL firewall rules in P-660H-Tx v2?..22

Configuration ..........................................................................................22

1. How do I configure the firewall? ...........................................22
2. How do I prevent others from configuring my firewall? .........22
3. Why can't I configure my P-660H-Tx v2 using Web
Configurator/Telnet over WAN? ...............................................23
4. Why can't I upload the firmware and configuration file using
FTP over WAN? .......................................................................24

Log and Alert ..........................................................................................25

1. When does the P-660H-Tx v2 generate the firewall log? .....25
2. What does the log show to us? ............................................25
3. How do I view the firewall log? .............................................25
4. When does the P-660H-Tx v2 generate the firewall alert? ...26
5. What is the difference between the log and alert?................26

Application Notes.....................................................................................27

2

All contents copyright © 2006 ZyXEL Communications Corporation.

Advertising