
Table of Contents
ZyWALL 2WG User’s Guide
20
22.1 Remote Management Overview ...................................................................................... 383
22.1.1 Remote Management Limitations .......................................................................... 384
22.1.2 System Timeout ..................................................................................................... 384
22.2 WWW (HTTP and HTTPS) ............................................................................................. 384
22.3 WWW .............................................................................................................................. 385
22.4 HTTPS Example .............................................................................................................. 387
22.4.1 Internet Explorer Warning Messages ..................................................................... 387
22.4.2 Netscape Navigator Warning Messages ................................................................ 387
22.4.3 Avoiding the Browser Warning Messages .............................................................. 388
22.4.4 Login Screen .......................................................................................................... 389
22.5 SSH .............................................................................................................................. 391
22.6 How SSH Works .............................................................................................................. 391
22.7 SSH Implementation on the ZyWALL .............................................................................. 392
22.7.1 Requirements for Using SSH ................................................................................. 392
22.8 Configuring SSH .............................................................................................................. 393
22.9 Secure Telnet Using SSH Examples ............................................................................... 394
22.9.1 Example 1: Microsoft Windows .............................................................................. 394
22.9.2 Example 2: Linux .................................................................................................... 394
22.10 Secure FTP Using SSH Example .................................................................................. 395
22.11 Telnet ........................................................................................................................... 396
22.12 Configuring TELNET ..................................................................................................... 396
22.13 FTP .............................................................................................................................. 397
22.14 SNMP .......................................................................................................................... 398
22.14.1 Supported MIBs .................................................................................................. 399
22.14.2 SNMP Traps ......................................................................................................... 400
22.14.3 REMOTE MANAGEMENT: SNMP ....................................................................... 400
22.15 DNS ............................................................................................................................. 401
22.16 Introducing Vantage CNM ............................................................................................. 402
22.17 Configuring CNM ........................................................................................................... 402
Chapter 23
UPnP ...................................................................................................................................... 405
23.1 Universal Plug and Play Overview ................................................................................ 405
23.1.1 How Do I Know If I'm Using UPnP? ....................................................................... 405
23.1.2 NAT Traversal ........................................................................................................ 405
23.1.3 Cautions with UPnP ............................................................................................... 405
23.1.4 UPnP and ZyXEL ................................................................................................... 406
23.2 Configuring UPnP ............................................................................................................ 406
23.3 Displaying UPnP Port Mapping .................................................................................... 407
23.4 Installing UPnP in Windows Example .............................................................................. 408
23.4.1 Installing UPnP in Windows Me ............................................................................. 409
23.4.2 Installing UPnP in Windows XP ............................................................................. 410
23.5 Using UPnP in Windows XP Example ............................................................................. 410