ZyXEL Communications 5 Series User Manual page 32

Internet security appliance
Table of Contents

Advertisement

List of Figures
Figure 125 WLAN Port Role Example ................................................................................................. 226
Figure 126 NETWORK > WLAN > Port Roles ..................................................................................... 227
Figure 127 NETWORK > WLAN > Port Roles: Change Complete ....................................................... 227
Figure 128 WLAN Overview ................................................................................................................. 229
Figure 129 ZyWALL Wireless Security Levels ...................................................................................... 230
Figure 130 WIRELESS > Wi-Fi > Wireless Card: No Security ............................................................. 232
Figure 131 WIRELESS > Wi-Fi > Wireless Card: Static WEP .............................................................. 235
Figure 132 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK ............................................................... 236
Figure 133 WIRELESS > Wi-Fi > Wireless Card: WPA ........................................................................ 237
Figure 134 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP .......................................... 238
Figure 135 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ............................................... 239
Figure 136 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ................................................... 241
Figure 138 WIRELESS > Wi-Fi > MAC Filter ....................................................................................... 243
Figure 139 EAP Authentication ............................................................................................................ 245
Figure 140 WPA-PSK Authentication ................................................................................................... 246
Figure 141 WPA with RADIUS Application Example ............................................................................ 247
Figure 142 Default Firewall Action ........................................................................................................ 251
Figure 143 Blocking All LAN to WAN IRC Traffic Example .................................................................. 253
Figure 144 Limited LAN to WAN IRC Traffic Example .......................................................................... 254
Figure 145 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 255
Figure 146 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 257
Figure 147 SECURITY > FIREWALL > Rule Summary ....................................................................... 259
Figure 148 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 261
Figure 149 SECURITY > FIREWALL > Anti-Probing ........................................................................... 263
............................................................................ 264
Figure 151 SECURITY > FIREWALL > Service ................................................................................... 266
Figure 152 SECURITY > FIREWALL > Service > Add ......................................................................... 267
Figure 153 My Service Firewall Rule Example: Service ...................................................................... 268
Figure 154 My Service Firewall Rule Example: Edit Custom Service ................................................. 268
Figure 155 My Service Firewall Rule Example: Rule Summary ........................................................... 269
Figure 156 My Service Firewall Rule Example: Rule Edit ................................................................... 269
Figure 157 My Service Firewall Rule Example: Rule Configuration ..................................................... 270
Figure 158 My Service Firewall Rule Example: Rule Summary ........................................................... 271
Figure 159 From LAN to VPN Example ............................................................................................... 273
Figure 160 From VPN to LAN Example ............................................................................................... 273
Figure 161 From VPN to VPN Example .............................................................................................. 274
Figure 162 Using IP Alias to Solve the Triangle Route Problem .......................................................... 275
Figure 163 Three-Way Handshake ....................................................................................................... 275
Figure 164 Network Intrusions ............................................................................................................. 277
Figure 165 Applying IDP to Interfaces .................................................................................................. 278
Figure 166 SECURITY > IDP > General .............................................................................................. 279
Figure 167 SECURITY > IDP > Signature: Group View ....................................................................... 283
32
ZyWALL 5/35/70 Series User's Guide

Advertisement

Table of Contents
loading

Table of Contents