ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual page 41

Internet security appliance
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Table 39 WAN: Ethernet Encapsulation ............................................................................. 140
Table 40 WAN: PPPoE Encapsulation ............................................................................... 144
Table 41 WAN: PPTP Encapsulation ................................................................................. 147
Table 42 Traffic Redirect .................................................................................................... 150
Table 43 Dial Backup ......................................................................................................... 153
Table 44 Advanced Setup .................................................................................................. 156
Table 45 DMZ ..................................................................................................................... 159
Table 46 DMZ Static DHCP ................................................................................................ 162
Table 47 DMZ: IP Alias ....................................................................................................... 163
Table 48 DMZ: Port Roles .................................................................................................. 168
Table 49 WLAN .................................................................................................................. 171
Table 50 WLAN Static DHCP ............................................................................................. 174
Table 51 WLAN IP Alias ..................................................................................................... 175
Table 52 WLAN Port Roles ................................................................................................ 177
Table 53 Wireless Security Relational Matrix ..................................................................... 180
Table 54 Wireless Card: No Security ................................................................................. 187
Table 55 Wireless Card: Static WEP .................................................................................. 189
Table 56 Wireless Card: WPA-PSK .................................................................................... 190
Table 57 Wireless Card: WPA ............................................................................................ 191
Table 58 Wireless Card: 802.1x + Dynamic WEP .............................................................. 192
Table 59 Wireless Card: 802.1x + Static WEP ................................................................... 193
Table 60 Wireless Card: 802.1x + No WEP ....................................................................... 195
Table 61 Wireless Card: No Access 802.1x + Static WEP ................................................. 196
Table 62 Wireless Card: MAC Address Filter ..................................................................... 197
Table 63 Common IP Ports ................................................................................................ 200
Table 64 ICMP Commands That Trigger Alerts .................................................................. 203
Table 65 Legal NetBIOS Commands ................................................................................. 203
Table 66 Legal SMTP Commands ..................................................................................... 204
Table 67 Default Rule (Router Mode) ................................................................................. 215
Table 68 Default Rule (Bridge Mode) ................................................................................. 217
Table 69 Rule Summary ..................................................................................................... 218
Table 70 Firewall Edit Rule ................................................................................................. 221
Table 71 Anti-Probing ......................................................................................................... 222
Table 72 Firewall Threshold ............................................................................................... 225
Table 73 Firewall Service ................................................................................................... 227
Table 74 Firewall Edit Custom Service ............................................................................... 228
Table 75 Predefined Services ............................................................................................ 229
Table 76 IDP: General Setup ............................................................................................. 242
Table 77 Attack Types ........................................................................................................ 243
Table 78 Intrusion Severity ................................................................................................. 244
Table 79 Signature Actions ................................................................................................ 245
Table 80 IDP Signatures: Group View ................................................................................ 246
Table 81 Signatures Update ............................................................................................... 252
41
List of Tables

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents