ZyXEL Communications ZyXEL ZyWALL 35 User Manual

Page 18

Advertising
background image

ZyWALL 35 User’s Guide

16

Chapter 21
Remote Management ...........................................................................................
351

21.1 Remote Management Overview .....................................................................351

21.1.1 Remote Management Limitations .........................................................352
21.1.2 Remote Management and NAT ............................................................352
21.1.3 System Timeout ...................................................................................352

21.2 Introduction to HTTPS ....................................................................................352
21.3 Configuring WWW ..........................................................................................353
21.4 HTTPS Example ............................................................................................355

21.4.1 Internet Explorer Warning Messages ...................................................355
21.4.2 Netscape Navigator Warning Messages ...............................................356
21.4.3 Avoiding the Browser Warning Messages ............................................357
21.4.4 Login Screen .........................................................................................357

21.5 SSH Overview ...............................................................................................360
21.6 How SSH works .............................................................................................360
21.7 SSH Implementation on the ZyWALL .............................................................361

21.7.1 Requirements for Using SSH ................................................................362

21.8 Configuring SSH ............................................................................................362
21.9 Secure Telnet Using SSH Examples ..............................................................363

21.9.1 Example 1: Microsoft Windows .............................................................363
21.9.2 Example 2: Linux ..................................................................................363

21.10 Secure FTP Using SSH Example ................................................................364
21.11 Telnet ............................................................................................................365
21.12 Configuring TELNET ....................................................................................365
21.13 Configuring FTP ...........................................................................................366
21.14 Configuring SNMP .......................................................................................367

21.14.1 Supported MIBs .................................................................................369
21.14.2 SNMP Traps .......................................................................................369
21.14.3 REMOTE MANAGEMENT: SNMP ......................................................369

21.15 Configuring DNS ..........................................................................................371
21.16 Introducing Vantage CNM ............................................................................371
21.17 Configuring CNM ..........................................................................................372

Chapter 22
UPnP......................................................................................................................
375

22.1 Universal Plug and Play Overview .................................................................375

22.1.1 How Do I Know If I'm Using UPnP? ......................................................375
22.1.2 NAT Traversal .......................................................................................375
22.1.3 Cautions with UPnP ..............................................................................375

22.2 UPnP and ZyXEL ...........................................................................................376
22.3 Configuring UPnP ..........................................................................................376
22.4 Displaying UPnP Port Mapping ......................................................................377
22.5 Installing UPnP in Windows Example ............................................................378

Advertising