ZyXEL Communications ZyWall 35 User Manual page 12

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide
7.5 TCP/IP Priority (Metric) ....................................................................................130
7.6 Configuring General .........................................................................................130
7.7 Configuring Load Balancing .............................................................................133
7.8 Configuring WAN Setup ...................................................................................136
7.9 Traffic Redirect .................................................................................................146
7.10 Configuring Traffic Redirect ............................................................................146
7.11 Configuring Dial Backup .................................................................................147
7.12 Advanced Modem Setup ................................................................................151
7.13 Configuring Advanced Modem Setup ............................................................151
DMZ Screens ........................................................................................................ 155
8.1 DMZ Overview .................................................................................................155
8.2 Configuring DMZ ..............................................................................................155
8.3 Configuring IP Alias ..........................................................................................157
8.4 DMZ Public IP Address Example .....................................................................159
8.5 DMZ Private and Public IP Address Example ..................................................160
8.6 Configuring Port Roles .....................................................................................160
Firewalls................................................................................................................ 163
9.1 Firewall Overview .............................................................................................163
9.2 Types of Firewalls ............................................................................................163
9.3 Introduction to ZyXEL's Firewall .......................................................................164
9.4 Denial of Service ..............................................................................................165
9.5 Stateful Inspection ............................................................................................169
10
7.7.1 Least Load First ......................................................................................133
7.7.2 Weighted Round Robin ...........................................................................134
7.7.3 Spillover ..................................................................................................135
7.8.1 Ethernet Encapsulation ...........................................................................136
7.8.2 PPPoE Encapsulation .............................................................................139
7.8.3 PPTP Encapsulation ...............................................................................143
7.12.1 AT Command Strings ............................................................................151
7.12.2 DTR Signal ...........................................................................................151
7.12.3 Response Strings ..................................................................................151
9.2.1 Packet Filtering Firewalls ........................................................................163
9.2.2 Application-level Firewalls ......................................................................163
9.2.3 Stateful Inspection Firewalls ...................................................................164
9.4.1 Basics .....................................................................................................165
9.4.2 Types of DoS Attacks .............................................................................166
9.4.2.1 ICMP Vulnerability ........................................................................168
9.4.2.2 Illegal Commands (NetBIOS and SMTP) ......................................168
9.4.2.3 Traceroute .....................................................................................169

Advertisement

Table of Contents
loading

Table of Contents