ZyWALL 5/35/70 Series User's Guide
8.8 WAN Route ......................................................................................................157
8.11 WAN MAC Address ........................................................................................160
8.12 WAN .............................................................................................................160
DMZ Screens ........................................................................................................ 179
9.2 Configuring DMZ ..............................................................................................179
9.4 DMZ IP Alias ..................................................................................................183
9.7 DMZ Port Roles ..............................................................................................187
Wireless LAN ........................................................................................................ 189
10.3 WLAN Static DHCP ......................................................................................192
10.4 WLAN IP Alias ..............................................................................................193
10.5 WLAN Port Roles ..........................................................................................195
10.6 Wireless Security ...........................................................................................197
10.8 WEP Encryption .............................................................................................199
10.9 802.1x Overview ............................................................................................200
14
..........................................................................................170
8.16.2 DTR Signal ...........................................................................................175
...............................................................................................................179
..........................................................................................182
.......................................................................................189
10.6.1 Encryption .............................................................................................198
10.6.2 Authentication .......................................................................................198
Table of Contents