ZyXEL Communications ZyXEL ZyWALL 2WG User Manual

Page 20

Advertising
background image

Table of Contents

ZyWALL 2WG User’s Guide

20

22.1 Remote Management Overview ...................................................................................... 383

22.1.1 Remote Management Limitations .......................................................................... 384
22.1.2 System Timeout ..................................................................................................... 384

22.2 WWW (HTTP and HTTPS) ............................................................................................. 384
22.3 WWW .............................................................................................................................. 385
22.4 HTTPS Example .............................................................................................................. 387

22.4.1 Internet Explorer Warning Messages ..................................................................... 387
22.4.2 Netscape Navigator Warning Messages ................................................................ 387
22.4.3 Avoiding the Browser Warning Messages .............................................................. 388
22.4.4 Login Screen .......................................................................................................... 389

22.5 SSH .............................................................................................................................. 391
22.6 How SSH Works .............................................................................................................. 391
22.7 SSH Implementation on the ZyWALL .............................................................................. 392

22.7.1 Requirements for Using SSH ................................................................................. 392

22.8 Configuring SSH .............................................................................................................. 393
22.9 Secure Telnet Using SSH Examples ............................................................................... 394

22.9.1 Example 1: Microsoft Windows .............................................................................. 394
22.9.2 Example 2: Linux .................................................................................................... 394

22.10 Secure FTP Using SSH Example .................................................................................. 395
22.11 Telnet ........................................................................................................................... 396
22.12 Configuring TELNET ..................................................................................................... 396
22.13 FTP .............................................................................................................................. 397
22.14 SNMP .......................................................................................................................... 398

22.14.1 Supported MIBs .................................................................................................. 399
22.14.2 SNMP Traps ......................................................................................................... 400
22.14.3 REMOTE MANAGEMENT: SNMP ....................................................................... 400

22.15 DNS ............................................................................................................................. 401
22.16 Introducing Vantage CNM ............................................................................................. 402
22.17 Configuring CNM ........................................................................................................... 402

Chapter 23
UPnP ...................................................................................................................................... 405

23.1 Universal Plug and Play Overview ................................................................................ 405

23.1.1 How Do I Know If I'm Using UPnP? ....................................................................... 405
23.1.2 NAT Traversal ........................................................................................................ 405
23.1.3 Cautions with UPnP ............................................................................................... 405
23.1.4 UPnP and ZyXEL ................................................................................................... 406

23.2 Configuring UPnP ............................................................................................................ 406
23.3 Displaying UPnP Port Mapping .................................................................................... 407
23.4 Installing UPnP in Windows Example .............................................................................. 408

23.4.1 Installing UPnP in Windows Me ............................................................................. 409
23.4.2 Installing UPnP in Windows XP ............................................................................. 410

23.5 Using UPnP in Windows XP Example ............................................................................. 410

Advertising