User`s guide
ZyAIR B-5000 User’s Guide
Table of Contents xi
26.2 Commands Summary..................................................................................................................26-1
26.3 Changing Your Password ..........................................................................................................26-10
Chapter 27 Firmware and Configuration File Maintenance..................................................................27-1
27.1 Filename Conventions .................................................................................................................27-1
27.1.1 TFTP and Telnet over WAN Will Not Work When ................................................................27-2
27.2 Backup Configuration .................................................................................................................27-2
27.2.1 Backup Configuration Example Using HyperTerminal ...........................................................27-3
27.3 Restore Configuration Example Using HyperTerminal ...........................................................27-5
27.4 Uploading Software .....................................................................................................................27-7
27.5 Example 1K Xmodem Firmware Upload Using HyperTerminal ............................................27-7
27.6 Example 1K Xmodem Image File Upload Using HyperTerminal ...........................................27-9
27.7 Resetting Your ZyAIR ...............................................................................................................27-10
Chapter 28 Firewall ...................................................................................................................................28-1
28.1 Background Information ............................................................................................................28-1
28.2 Firewall Overview........................................................................................................................28-1
28.3 Introduction to ZyXEL’s Firewall ..............................................................................................28-2
28.4 Denial of Service ..........................................................................................................................28-2
28.4.1 Basics .......................................................................................................................................28-3
28.4.2 Types of DoS Attacks ..............................................................................................................28-3
28.5 Enabling the Firewall ..................................................................................................................28-6
28.6 Firewall Access Control...............................................................................................................28-7
28.6.1 TCP ..........................................................................................................................................28-8
28.6.2 UDP..........................................................................................................................................28-8
28.6.3 ICMP........................................................................................................................................28-8
28.6.4 IP ..............................................................................................................................................28-8
28.6.5 Configuring Firewall Access Control.......................................................................................28-8
28.7 Anti – Denial of Service .............................................................................................................28-11
Appendix A Site Planning...........................................................................................................................A-1
Appendix B Site Installation ...................................................................................................................... B-1
Appendix C Setting up Your Computer’s IP Address ..............................................................................C-1
Appendix D Wireless LAN With IEEE 802.1x .........................................................................................D-1
Appendix E Types of EAP Authentication ................................................................................................E-1
Appendix F Troubleshooting...................................................................................................................... F-1
Appendix G Technical Specifications ....................................................................................................... G-1
Appendix H Power Specifications............................................................................................................. H-1
Appendix I Approvals.................................................................................................................................. I-1
Appendix J Packaging Specifications.........................................................................................................J-1
Index............................................................................................................................................................ K-1