ZyXEL Communications P-660H-TX Car Stereo System User Manual


 
P-660H-Tx v2 Support Notes
17. What do the ATM QoS Types (CBR, UBR, VBR-nRT, VBR-RT) mean?
................................................................................................................14
18. What is content filter? .......................................................................15
ADSL FAQ.................................................................................................16
1. How does ADSL compare to Cable modems?....................................16
2. What is the expected throughput? ......................................................16
3. What is the microfilter used for? .........................................................16
4. How do I know the ADSL line is up?...................................................17
5. How does the P-660H-Tx v2 work on a noisy ADSL?.........................17
6. Does the VC-based multiplexing perform better than the LLC-based
multiplexing?
...........................................................................................17
7. How do I know the details of my ADSL line statistics?........................17
8. What are the signaling pins of the ADSL connector?..........................18
9. What is triple play? .............................................................................17
Firewall FAQ .............................................................................................19
General...................................................................................................19
1. What is a network firewall?...................................................19
2. What makes P-660H-Tx v2 secure?.....................................19
3. What are the basic types of firewalls? ..................................19
4. What kind of firewall is the P-660H-Tx v2?...........................20
5. Why do you need a firewall when your router has packet
filtering and NAT built-in?
.........................................................20
6. What is Denials of Service (DoS) attack?.............................20
7. What is Ping of Death attack? ..............................................21
8. What is Teardrop attack? .....................................................21
9. What is SYN Flood attack?...................................................21
10. What is LAND attack? ........................................................21
11 What is Brute-force attack? .................................................22
12. What is IP Spoofing attack? ...............................................22
13. What are the default ACL firewall rules in P-660H-Tx v2?..22
Configuration ..........................................................................................22
1. How do I configure the firewall? ...........................................22
2. How do I prevent others from configuring my firewall?.........22
3. Why can't I configure my P-660H-Tx v2 using Web
Configurator/Telnet over WAN?
...............................................23
4. Why can't I upload the firmware and configuration file using
FTP over WAN?
.......................................................................24
Log and Alert ..........................................................................................25
1. When does the P-660H-Tx v2 generate the firewall log? .....25
2. What does the log show to us? ............................................25
3. How do I view the firewall log? .............................................25
4. When does the P-660H-Tx v2 generate the firewall alert? ...26
5. What is the difference between the log and alert?................26
Application Notes.....................................................................................27
2
All contents copyright © 2006 ZyXEL Communications Corporation.