ZyXEL Communications ZyWall 5 Series User Manual page 46

Internet security appliance
Hide thumbs Also See for ZyWall 5 Series:
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Table 40 NETWORK > WAN > WAN (Ethernet Encapsulation) ......................................... 161
Table 41 NETWORK > WAN > WAN (PPPoE Encapsulation) ........................................... 165
Table 42 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................. 168
Table 43 NETWORK > WAN > Traffic Redirect .................................................................. 171
Table 44 NETWORK > WAN > Dial Backup ....................................................................... 173
Table 45 NETWORK > WAN > Dial Backup > Edit ............................................................ 176
Table 46 NETWORK > DMZ .............................................................................................. 180
Table 47 NETWORK > DMZ > Static DHCP ...................................................................... 183
Table 48 NETWORK > DMZ > IP Alias .............................................................................. 184
Table 49 NETWORK > DMZ > Port Roles ......................................................................... 188
Table 50 NETWORK > WLAN ............................................................................................ 190
Table 51 NETWORK > WLAN > Static DHCP .................................................................... 193
Table 52 NETWORK > WLAN > IP Alias ........................................................................... 194
Table 53 NETWORK > WLAN > Port Roles ....................................................................... 197
Table 54 Wireless Security Relational Matrix ..................................................................... 199
Table 55 NETWORK > WIRELESS CARD: No Security .................................................... 206
Table 56 NETWORK > WIRELESS CARD: Static WEP .................................................... 208
Table 57 NETWORK > WIRELESS CARD: WPA-PSK ...................................................... 209
Table 58 NETWORK > WIRELESS CARD: WPA .............................................................. 210
Table 59 NETWORK > WIRELESS CARD: 802.1x + Dynamic WEP ................................ 212
Table 60 NETWORK > WIRELESS CARD: 802.1x + Static WEP ..................................... 213
Table 61 NETWORK > WIRELESS CARD: 802.1x + No WEP .......................................... 215
Table 63 NETWORK > WIRELESS CARD: MAC Address Filter ....................................... 217
Table 64 Blocking All LAN to WAN IRC Traffic Example .................................................... 227
Table 65 Limited LAN to WAN IRC Traffic Example ........................................................... 228
Table 66 SECURITY > FIREWALL > Default Rule (Router Mode) .................................... 231
Table 67 SECURITY > FIREWALL > Default Rule (Bridge Mode) ..................................... 233
Table 68 SECURITY > FIREWALL > Rule Summary ......................................................... 235
Table 69 SECURITY > FIREWALL > Rule Summary > Edit .............................................. 238
Table 70 SECURITY > FIREWALL > Anti-Probing ............................................................. 240
Table 71 SECURITY > FIREWALL > Threshold ................................................................ 242
Table 72 SECURITY > FIREWALL > Service .................................................................... 244
Table 73 SECURITY > FIREWALL > Service > Add .......................................................... 245
Table 74 SECURITY > IDP > General Setup ..................................................................... 256
Table 75 SECURITY > IDP > Signature: Attack Types ...................................................... 258
Table 76 SECURITY > IDP > Signature: Intrusion Severity ............................................... 259
Table 77 SECURITY > IDP > Signature: Actions ............................................................... 260
Table 78 SECURITY > IDP > Signature: Group View ........................................................ 261
Table 79 SECURITY > IDP > Signature: Query View ........................................................ 263
Table 80 SECURITY > IDP > Update ................................................................................. 268
Table 81 Common Computer Virus Types ......................................................................... 271
46
List of Tables

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 70 seriesZywall 35 series

Table of Contents