
Chapter 23 Remote Management Configuration
P-2602HWLNI User’s Guide
354
Figure 202
Remote Management: ICMP
The following table describes the labels in this screen.
23.10 SSH
You can use SSH (Secure SHell) to securely access the ZyXEL Device’s command line
interface. Specify which interfaces allow SSH access and from which IP address the access
can come.
Unlike Telnet or FTP, which transmit data in plaintext (clear or unencrypted text), SSH is a
secure communication protocol that combines authentication and data encryption to provide
secure encrypted communication between two hosts over an unsecured network. In the
following figure, computer
A
on the Internet uses SSH to securely connect to the WAN port of
the ZyXEL Device for a management session.
Table 144
Remote Management: ICMP
LABEL
DESCRIPTION
ICMP
Internet Control Message Protocol is a message control and error-reporting
protocol between a host server and a gateway to the Internet. ICMP uses Internet
Protocol (IP) datagrams, but the messages are processed by the TCP/IP software
and directly apparent to the application user.
Respond to Ping
on
The ZyXEL Device will not respond to any incoming Ping requests when
Disable
is
selected. Select
LAN
to reply to incoming LAN Ping requests.
Select
WAN
to reply
to incoming WAN Ping requests. Otherwise select
LAN & WAN
to reply to both
incoming LAN and WAN Ping requests.
Do not respond to
requests for
unauthorized
services
Select this option to prevent hackers from finding the ZyXEL Device by probing for
unused ports. If you select this option, the ZyXEL Device will not respond to port
request(s) for unused ports, thus leaving the unused ports and the ZyXEL Device
unseen. By default this option is not selected and the ZyXEL Device will reply with
an ICMP Port Unreachable packet for a port probe on its unused UDP ports, and a
TCP Reset packet for a port probe on its unused TCP ports.
Note that the probing packets must first traverse the ZyXEL Device's firewall
mechanism before reaching this anti-probing mechanism. Therefore if the firewall
mechanism blocks a probing packet, the ZyXEL Device reacts based on the
corresponding firewall policy to send a TCP reset packet for a blocked TCP packet
or an ICMP port-unreachable packet for a blocked UDP packets or just drop the
packets without sending a response packet.
Apply
Click
Apply
to save your customized settings and exit this screen.
Cancel
Click
Cancel
to begin configuring this screen afresh.
Содержание P-2602HWLNI
Страница 2: ......
Страница 7: ...Safety Warnings P 2602HWLNI User s Guide 7...
Страница 8: ...Safety Warnings P 2602HWLNI User s Guide 8...
Страница 24: ...Table of Contents P 2602HWLNI User s Guide 24...
Страница 32: ...List of Figures P 2602HWLNI User s Guide 32...
Страница 38: ...List of Tables P 2602HWLNI User s Guide 38...
Страница 39: ...39 PART I Introduction Introducing the ZyXEL Device 41 Introducing the Web Configurator 49...
Страница 40: ...40...
Страница 60: ...Chapter 2 Introducing the Web Configurator P 2602HWLNI User s Guide 60...
Страница 62: ...62...
Страница 86: ...Chapter 5 Bandwidth Management Wizard P 2602HWLNI User s Guide 86...
Страница 98: ...Chapter 6 Status Screens P 2602HWLNI User s Guide 98...
Страница 99: ...99 PART III Network WAN Setup 101 LAN Setup 117 Wireless LAN 129 Network Address Translation NAT Screens 155...
Страница 100: ...100...
Страница 154: ...Chapter 9 Wireless LAN P 2602HWLNI User s Guide 154...
Страница 166: ...Chapter 10 Network Address Translation NAT Screens P 2602HWLNI User s Guide 166...
Страница 167: ...167 PART IV VoIP Voice 169 VoIP Trunking 211 Phone Usage 227...
Страница 168: ...168...
Страница 226: ...Chapter 12 VoIP Trunking P 2602HWLNI User s Guide 226...
Страница 230: ...Chapter 13 Phone Usage P 2602HWLNI User s Guide 230...
Страница 232: ...232...
Страница 264: ...Chapter 15 Firewall Configuration P 2602HWLNI User s Guide 264...
Страница 268: ...Chapter 16 Content Filtering P 2602HWLNI User s Guide 268...
Страница 274: ...Chapter 17 Introduction to IPSec P 2602HWLNI User s Guide 274...
Страница 309: ...Chapter 19 Certificates P 2602HWLNI User s Guide 309 Figure 173 My Certificate Details...
Страница 320: ...Chapter 19 Certificates P 2602HWLNI User s Guide 320 Figure 181 Trusted Remote Host Details...
Страница 326: ...326...
Страница 330: ...Chapter 20 Static Route P 2602HWLNI User s Guide 330...
Страница 338: ...Chapter 21 Bandwidth Management P 2602HWLNI User s Guide 338...
Страница 342: ...Chapter 22 Dynamic DNS Setup P 2602HWLNI User s Guide 342...
Страница 360: ...Chapter 23 Remote Management Configuration P 2602HWLNI User s Guide 360...
Страница 372: ...Chapter 24 Universal Plug and Play UPnP P 2602HWLNI User s Guide 372...
Страница 374: ...374...
Страница 380: ...Chapter 25 System P 2602HWLNI User s Guide 380...
Страница 406: ...Chapter 28 Troubleshooting P 2602HWLNI User s Guide 406...
Страница 422: ...Chapter 30 Diagnostic P 2602HWLNI User s Guide 422...
Страница 432: ...Chapter 31 Product Specifications P 2602HWLNI User s Guide 432...
Страница 434: ...434...
Страница 446: ...Appendix A Setting up Your Computer s IP Address P 2602HWLNI User s Guide 446...
Страница 482: ...Appendix F Legal Information P 2602HWLNI User s Guide 482...
Страница 488: ...Appendix G Customer Support P 2602HWLNI User s Guide 488...