HOME

TheInfoList



OR:

ZyNOS is the proprietary operating system used on network devices made by Zyxel Communications. The name is a contraction of Zyxel and
Network Operating System A network operating system (NOS) is a specialized operating system for a network device such as a router, switch or firewall. Historically operating systems with networking capabilities were described as network operating systems, because they al ...
(NOS).


History

Zyxel first introduced ZyNOS in 1998.


Versions

Zyxel released ZyNOS version 4.0 for their GS2200 series 24 and 48 port
ethernet switch A network switch (also called switching hub, bridging hub, and, by the IEEE, MAC bridge) is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. A netw ...
es in April, 2012. It appears that versions differ between Zyxel products.


Access methods

Web and/or
command-line interface A command-line interpreter or command-line processor uses a command-line interface (CLI) to receive commands from a user in the form of lines of text. This provides a means of setting parameters for the environment, invoking executables and pro ...
(CLI) depending on the device. Web access is accomplished by connecting an
Ethernet Ethernet () is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 198 ...
cable between a PC and an open port on the device and entering the IP address of the device into the Web browser. An
RS-232 In telecommunications, RS-232 or Recommended Standard 232 is a standard originally introduced in 1960 for serial communication transmission of data. It formally defines signals connecting between a ''DTE'' (''data terminal equipment'') such a ...
serial console port is provided on some devices for CLI access, which is accomplished by using
SSH The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. SSH applications are based on a ...
or
telnet Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control i ...
.


CLI command types

Listed below are the categories that the CLI commands are grouped by. * system-related commands * exit command * Ethernet-related commands * WAN-related commands *
WLAN A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building ...
-related commands * IP-related commands * PPP-related commands *
bridge A bridge is a structure built to span a physical obstacle (such as a body of water, valley, road, or rail) without blocking the way underneath. It is constructed for the purpose of providing passage over the obstacle, which is usually somethi ...
-related commands *
RADIUS In classical geometry, a radius ( : radii) of a circle or sphere is any of the line segments from its center to its perimeter, and in more modern usage, it is also their length. The name comes from the latin ''radius'', meaning ray but also the ...
-related commands *
802.1x IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a Local area network, LAN or Wireless ...
-related commands *
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
-related commands * configuration-related commands * SMT-related commands.


Web Configurator

The Web Configurator is divided into the following categories: * basic settings * advanced application * IP application * management


Security advisories

As of January 2014 a ZyNOS ROM-0 vulnerability has been identified. This vulnerability allowed attacker to download router's configuration (ROM-0 file) without any type of authentication required. Such configuration file can be later decompressed to expose router's administrator password, ISP password, wireless password etc. , Danish computer security company
Secunia Flexera is an American computer software company based in Itasca, Illinois. History On 1 April 2008, Macrovision sold its software division to the Thoma Bravo investment fund, which became Acresso Software. Macrovision subsequently changed i ...
reports no unpatched advisories or vulnerabilities on ZyNOS version 4.x. , Secunia reports seven advisories and six vulnerabilities on ZyNOS version 3.x. Five advisories are unpatched; Secunia rates the most severe unpatched advisory as less critical. , a DNS vulnerability has been found in certain ZyNOS firmware versions. The versions that are affected have not been narrowed down. The attack can be done from a remote location regardless if the user interface is accessible from the outside of a LAN.


References

{{Network operating systems Network operating systems Proprietary operating systems