ZyXEL Communications ZyWall 35 User Manual page 28

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide
Figure 37 Wireless: WPA-PSK ............................................................................................ 116
Figure 38 Wireless: WPA .................................................................................................... 117
Figure 39 Wireless: 802.1x + Dynamic WEP ...................................................................... 118
Figure 40 Wireless: 802.1x + Static WEP ........................................................................... 119
Figure 41 Wireless: 802.1x + No WEP ............................................................................... 121
Figure 42 Wireless: No Access 802.1x + Static WEP ......................................................... 122
Figure 43 MAC Address Filter ............................................................................................. 123
Figure 44 Least Load First Example .................................................................................. 128
Figure 45 Weighted Round Robin Algorithm Example ........................................................ 129
Figure 46 Spillover Algorithm Example ............................................................................... 130
Figure 47 General ............................................................................................................... 131
Figure 48 Load Balancing: Least Load First ....................................................................... 134
Figure 49 Load Balancing: Weighted Round Robin ............................................................ 135
Figure 50 Load Balancing: Spillover .................................................................................... 136
Figure 51 WAN: Ethernet Encapsulation ............................................................................. 137
Figure 52 WAN: PPPoE Encapsulation ............................................................................... 140
Figure 53 WAN: PPTP Encapsulation ................................................................................. 143
Figure 54 Traffic Redirect WAN Setup ................................................................................ 146
Figure 55 Traffic Redirect LAN Setup ................................................................................. 146
Figure 56 Traffic Redirect .................................................................................................... 147
Figure 57 Dial Backup Setup .............................................................................................. 148
Figure 58 Advanced Setup .................................................................................................. 152
Figure 59 DMZ .................................................................................................................... 156
Figure 60 IP Alias ................................................................................................................ 158
Figure 61 DMZ Public Address Example ............................................................................ 159
Figure 62 DMZ Private and Public Address Example ......................................................... 160
Figure 63 Port Roles ........................................................................................................... 161
Figure 64 Port Roles Change Complete ............................................................................. 161
Figure 65 ZyWALL Firewall Application .............................................................................. 165
Figure 66 Three-Way Handshake ....................................................................................... 166
Figure 67 SYN Flood ........................................................................................................... 167
Figure 68 Smurf Attack ....................................................................................................... 168
Figure 69 Stateful Inspection ............................................................................................... 170
Figure 70 LAN to WAN Traffic ............................................................................................. 178
Figure 71 WAN to LAN Traffic ............................................................................................. 179
Figure 72 Default Rule (Router Mode) ................................................................................ 180
Figure 73 Default Rule (Bridge Mode) ................................................................................ 181
Figure 74 Rule Summary .................................................................................................... 182
Figure 75 Creating/Editing A Firewall Rule ......................................................................... 184
Figure 76 Creating/Editing A Custom Service ..................................................................... 186
Figure 77 Rule Summary .................................................................................................... 187
Figure 78 Rule Edit Example .............................................................................................. 188
Figure 79 Edit Custom Service Example ............................................................................ 188
26

Advertisement

Table of Contents
loading

Table of Contents