ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual page 30

Internet security appliance
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Figure 82 Wireless Card: WPA-PSK ................................................................................... 190
Figure 83 Wireless Card: WPA ........................................................................................... 191
Figure 84 Wireless Card: 802.1x + Dynamic WEP ............................................................. 192
Figure 85 Wireless Card: 802.1x + Static WEP ................................................................... 193
Figure 86 Wireless Card: 802.1x + No WEP ....................................................................... 194
Figure 87 Wireless Card: No Access 802.1x + Static WEP ................................................ 195
Figure 88 Wireless Card: MAC Address Filter .................................................................... 197
Figure 89 ZyWALL Firewall Application .............................................................................. 200
Figure 90 Three-Way Handshake ....................................................................................... 201
Figure 91 SYN Flood ........................................................................................................... 202
Figure 92 Smurf Attack ....................................................................................................... 203
Figure 93 Stateful Inspection ............................................................................................... 205
Figure 94 LAN to WAN Traffic ............................................................................................. 214
Figure 95 WAN to LAN Traffic ............................................................................................. 214
Figure 96 Default Rule (Router Mode) ................................................................................ 215
Figure 97 Default Rule (Bridge Mode) ................................................................................ 217
Figure 98 Rule Summary .................................................................................................... 218
Figure 99 Firewall Edit Rule ................................................................................................ 220
Figure 100 Anti-Probing ...................................................................................................... 222
Figure 101 Firewall Threshold ............................................................................................. 225
Figure 102 Firewall Service ................................................................................................. 227
Figure 103 Firewall Edit Custom Service ............................................................................ 228
Figure 104 Service .............................................................................................................. 232
Figure 105 Edit Custom Service Example .......................................................................... 232
Figure 106 Rule Summary .................................................................................................. 233
Figure 107 Rule Edit Example ............................................................................................ 233
Figure 108 My Service Rule Configuration ......................................................................... 234
Figure 109 My Service Example Rule Summary ................................................................ 235
Figure 110 Network Intrusions ........................................................................................... 236
Figure 111 Applying IDP to Interfaces ................................................................................. 241
Figure 112 IDP: General ..................................................................................................... 242
Figure 113 Attack Types ...................................................................................................... 243
Figure 114 Signature Actions .............................................................................................. 245
Figure 115 IDP: Signatures ................................................................................................. 246
Figure 116 Signature Query by Partial Name ..................................................................... 248
Figure 117 Signature Query by Complete ID ...................................................................... 249
Figure 118 Signature Query by Attribute. ............................................................................ 250
Figure 119 Signatures Update ............................................................................................ 251
Figure 120 IDP: Backup & Restore ..................................................................................... 253
.......................................................................... 256
Figure 122 Anti-Virus: General ........................................................................................... 257
Figure 123 Anti-Virus: Update ............................................................................................. 260
Figure 124 Anti-spam External Database Example ............................................................ 264
List of Figures
30

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents