ZyXEL Communications ZyXEL ZyWALL 2WG User Manual page 44

Internet security appliance
Hide thumbs Also See for ZyXEL ZyWALL 2WG:
Table of Contents

Advertisement

List of Tables
Table 39 NETWORK > WAN > WAN 1 (PPPoE Encapsulation) ......................................................... 182
Table 40 NETWORK > WAN > WAN 1 (PPTP Encapsulation) ............................................................ 185
Table 41 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies ......................................................... 188
Table 42 NETWORK > WAN > WAN 2 (3G WAN) .............................................................................. 190
Table 43 NETWORK > WAN > Traffic Redirect ................................................................................... 194
Table 44 NETWORK > WAN > Dial Backup ........................................................................................ 195
Table 45 NETWORK > WAN > Dial Backup > Edit .............................................................................. 199
Table 46 NETWORK > DMZ ................................................................................................................ 202
Table 47 NETWORK > DMZ > Static DHCP ........................................................................................ 205
Table 48 NETWORK > DMZ > IP Alias ............................................................................................... 206
Table 49 NETWORK > DMZ > Port Roles ........................................................................................... 210
Table 50 NETWORK > WLAN ............................................................................................................. 213
Table 51 NETWORK > WLAN > Static DHCP ..................................................................................... 216
Table 52 NETWORK > WLAN > IP Alias ............................................................................................. 217
Table 53 NETWORK > WLAN > Port Roles ........................................................................................ 220
Table 54 Types of Encryption for Each Type of Authentication ........................................................... 222
Table 55 WIRELESS > Wi-Fi > Wireless Card .................................................................................... 224
Table 56 Configuring SSID .................................................................................................................. 227
Table 57 Security Modes ..................................................................................................................... 227
Table 58 WIRELESS > Wi-Fi > Security .............................................................................................. 228
Table 59 WIRELESS > Wi-Fi > Security: None ................................................................................... 229
Table 60 WIRELESS > Wi-Fi > Security: WEP .................................................................................... 230
Table 61 WIRELESS > Wi-Fi > Security: 802.1x Only ......................................................................... 230
Table 62 WIRELESS > Wi-Fi > Security: 802.1x + Static WEP ........................................................... 231
Table 63 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX ................................................. 233
Table 64 WIRELESS > Wi-Fi > Security: WPA(2)-PSK ....................................................................... 234
Table 65 WIRELESS > Wi-Fi > MAC Filter .......................................................................................... 235
Table 66 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 249
Table 67 Limited LAN to WAN IRC Traffic Example ............................................................................ 249
Table 68 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 252
Table 69 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 254
Table 70 SECURITY > FIREWALL > Rule Summary .......................................................................... 256
Table 71 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 259
Table 72 SECURITY > FIREWALL > Anti-Probing .............................................................................. 261
Table 73 SECURITY > FIREWALL > Threshold .................................................................................. 263
Table 74 SECURITY > FIREWALL > Service ...................................................................................... 264
Table 75 SECURITY > FIREWALL > Service > Add ........................................................................... 266
Table 76 SECURITY > CONTENT FILTER > General ........................................................................ 273
Table 77 SECURITY > CONTENT FILTER > Policy ........................................................................... 276
Table 78 SECURITY > CONTENT FILTER > Policy > General ........................................................... 277
Table 79 SECURITY > CONTENT FILTER > Policy > External Database .......................................... 279
Table 80 SECURITY > CONTENT FILTER > Policy > Customization ................................................. 286
Table 81 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................ 288
44
ZyWALL 2WG User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 2wg - v4.03Zywall 2wg - v4.04

Table of Contents