User`s manual

P-660 Series Support Notes
3
All contents copyright © 2005 ZyXEL Communications Corporation.
7. How do I know the details of my ADSL line statistics?.............................................................17
8.What are the possible reasons when the ADSL link is down?....................................................18
9.What are the signaling pins of the ADSL connector? ................................................................18
FIREWALL FAQ (FOR P-660 H/HW ONLY) ....................................................................................19
General.........................................................................................................................................19
1. What is a network firewall? .................................................................................................................19
2. What makes P-660 secure? ..................................................................................................................19
3. What are the basic types of firewalls?..................................................................................................19
4. What kind of firewall is the P-660?......................................................................................................20
5. Why do you need a firewall when your router has packet filtering and NAT built-in? ........................20
6. What is Denials of Service (DoS) attack? ............................................................................................20
7. What is Ping of Death attack?..............................................................................................................21
8. What is Teardrop attack?.....................................................................................................................21
9. What is SYN Flood attack?...................................................................................................................21
10. What is LAND attack?........................................................................................................................21
11 What is Brute-force attack?.................................................................................................................21
12. What is IP Spoofing attack?...............................................................................................................22
13. What are the default ACL firewall rules in P-660?............................................................................22
Configuration ..............................................................................................................................22
1. How do I configure the firewall? .........................................................................................................22
2. How do I prevent others from configuring my firewall? ......................................................................22
3. Can I use a browser to configure my P-660?.......................................................................................22
4. Why can't I configure my router using Telnet over WAN?...................................................................22
5. Why can't I upload the firmware and configuration file using FTP over WAN?..................................23
Log and Alert ..............................................................................................................................23
1. When does the P-660 generate the firewall log?..................................................................................23
2. What does the log show to us? .............................................................................................................24
3. How do I view the firewall log? ...........................................................................................................24
4. When does the P-660 generate the firewall alert? ...............................................................................25
5. What does the alert show to us?...........................................................................................................25
6. What is the difference between the log and alert?................................................................................25
GENERAL APPLICATION NOTES.......................................................................................................25
1. Internet Access Using P-660 under Bridge mode.....................................................................26
Set up your workstation............................................................................................................................26
Setup your P-660 under bridge mode.......................................................................................................27
2. Internet Access Using P-660 under Router mode.....................................................................29
Set up your workstation............................................................................................................................29
Set up your P-660.....................................................................................................................................30
3. Setup the P-660 as a DHCP Relay............................................................................................32
4. SUA Notes.................................................................................................................................33
Tested SUA/NAT Applications (e.g., Cu-SeeMe, ICQ, NetMeeting).........................................................33
Configure an Internal Server Behind SUA...............................................................................................36
Configure a PPTP server behind SUA.....................................................................................................37
5. Using Multi-NAT.......................................................................................................................41