ZyXEL Communications VANTAGE CNM - V3.1 User Manual page 20

Centralized network management
Table of Contents

Advertisement

Figure 39 Device Operation > Device Configuration > Network > WAN > WAN1/2 - PPTP (ZyNOS
ZyWALL with two WAN ports) ...................................................................................... 87
Figure 40 Device Configuration > Network > WAN > 3G(WAN 2) ......................................................... 91
Figure 41 Device Operation > Device Configuration > Network > WAN > Dial Backup (ZyNOS ZyWALL)
95
Figure 42 Device Operation > Device Configuration > Network > WAN > Dial Backup > Advanced (ZyNOS
ZyWALL) ....................................................................................................................... 97
Figure 43 Device Operation > Device Configuration > Network > WAN > Dial Backup > Edit (ZyNOS
ZyWALL) ....................................................................................................................... 99
Figure 44 Device Operation > Device Configuration > Network > WAN > Setup (Prestige) ................ 101
Figure 45 Device Operation > Device Configuration > Network > WAN > Backup (Prestige) .............. 104
Figure 46 Device Operation > Device Configuration > Network > WAN > Backup > Advanced (Prestige)
106
Figure 47 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card ..... 109
Figure 48 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card
(Advanced Wireless Security Settings) ....................................................................... 111
Figure 49 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter ........... 116
Figure 50 Example: Device Operation > Device Configuration > VPN > IPSec VPN (ZLD) ................ 117
Figure 51 Device Operation > Device Configuration > Security > Firewall > Default Rule ................... 118
Figure 52 Device Operation > Device Configuration > Security > Firewall > Rule Summary ............... 120
Figure 53 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Edit .... 122
Figure 54 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ................... 124
Figure 55 Device Operation > Device Configuration > Security > Firewall > Threshold ...................... 125
Figure 56 Device Operation > Device Configuration > Security > Firewall > Service .......................... 127
Figure 57 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 128
Figure 58 IPSec High Availability ......................................................................................................... 129
Figure 59 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) ................. 130
Figure 60 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway
Policy Add/Edit ........................................................................................................... 131
Figure 61 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Add/Edit ...................................................................................................................... 137
Figure 62 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Move ........................................................................................................................... 142
Figure 63 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) ........... 143
Figure 64 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit
144
Figure 65 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 147
Figure 66 Device Operation > Device Configuration > Security > Anti-Virus > General ...................... 149
Figure 67 Device Operation > Device Configuration > Security > Anti-Spam > General ..................... 151
Figure 68 Device Operation > Device Configuration > Security > Anti-Spam > External DB ............... 153
Figure 69 Device Operation > Device Configuration > Security > Anti-Spam > Lists ........................... 155
Figure 70 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit ......... 157
Figure 71 Device Operation > Device Configuration > Security > IDP > General ................................ 159
Figure 72 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 161
Figure 73 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 162
20
Vantage CNM User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage cnm

Table of Contents