P-660 series Support Notes
3. What is the micro filter used for? ....................................................................16
4. How do I know the ADSL line is up?..............................................................16
5. How does the P-660 work on a noisy ADSL?...............................................16
6. Does the VC-based multiplexing perform better than the LLC-based
multiplexing?
.......................................................................................................17
7. How do I know the details of my ADSL line statistics?..................................17
8.What are the possible reasons when the ADSL link is down? .........................17
9.What are the signaling pins of the ADSL connector?.......................................17
Firewall FAQ (For P-660 H/HW Only) ...............................................................18
General.................................................................................................................18
1. What is a network firewall?.............................................................18
2. What makes P-660 secure?..............................................................18
3. What are the basic types of firewalls? .............................................18
4. What kind of firewall is the P-660?.................................................19
5. Why do you need a firewall when your router has packet filtering
and NAT built-in?
................................................................................19
6. What is Denials of Service (DoS) attack?........................................19
7. What is Ping of Death attack?..........................................................20
8. What is Teardrop attack?.................................................................20
9. What is SYN Flood attack?..............................................................20
10. What is LAND attack?...................................................................20
11 What is Brute-force attack? ............................................................20
12. What is IP Spoofing attack?...........................................................21
13. What are the default ACL firewall rules in P-660? .......................21
Configuration.......................................................................................................21
1. How do I configure the firewall?.....................................................21
2. How do I prevent others from configuring my firewall?.................21
3. Can I use a browser to configure my P-660?...................................21
4. Why can't I configure my router using Telnet over WAN?.............21
5. Why can't I upload the firmware and configuration file using FTP
over WAN?
..........................................................................................22
Log and Alert.......................................................................................................22
1. When does the P-660 generate the firewall log? .............................22
2. What does the log show to us?.........................................................23
3. How do I view the firewall log? ......................................................23
4. When does the P-660 generate the firewall alert? ...........................24
5. What does the alert show to us?.......................................................24
6. What is the difference between the log and alert?...........................24
General Application Notes....................................................................................25
1. Internet Access Using P-660 under Bridge mode............................................25
Set up your workstation .......................................................................25
Setup your P-660 under bridge mode ..................................................26
2. Internet Access Using P-660 under Router mode............................................28
Set up your workstation .......................................................................28
2
All contents copyright © 2005 ZyXEL Communications Corporation.