ZyXEL Communications 5 Series User Manual page 42

Internet security appliance
Table of Contents

Advertisement

List of Tables
Table 39 Load Balancing: Weighted Round Robin .............................................................................. 180
Table 40 Load Balancing: Spillover ...................................................................................................... 181
Table 41 Private IP Address Ranges ................................................................................................... 182
Table 42 NETWORK > WAN > WAN (Ethernet Encapsulation) .......................................................... 184
Table 43 NETWORK > WAN > WAN (PPPoE Encapsulation) ............................................................ 187
Table 44 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................................... 190
Table 45 NETWORK > WAN > 3G (WAN 2) ........................................................................................ 194
Table 46 NETWORK > WAN > Traffic Redirect ................................................................................... 198
Table 47 NETWORK > WAN > Dial Backup ........................................................................................ 200
Table 48 NETWORK > WAN > Dial Backup > Edit .............................................................................. 203
Table 49 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies ......................................................... 204
Table 50 NETWORK > DMZ .................................................................................................................211
Table 51 NETWORK > DMZ > Static DHCP ........................................................................................ 214
Table 52 NETWORK > DMZ > IP Alias ............................................................................................... 215
Table 53 NETWORK > DMZ > Port Roles ........................................................................................... 216
Table 54 NETWORK > WLAN ............................................................................................................. 221
Table 55 NETWORK > WLAN > Static DHCP ..................................................................................... 224
Table 56 NETWORK > WLAN > IP Alias ............................................................................................. 225
Table 57 NETWORK > WLAN > Port Roles ........................................................................................ 227
Table 58 WIRELESS > Wi-Fi > Wireless Card: No Security ................................................................ 233
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP ................................................................ 235
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK .................................................................. 236
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA .......................................................................... 237
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP ............................................ 238
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ................................................. 239
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ...................................................... 241
Table 66 WIRELESS > Wi-Fi > MAC Filter .......................................................................................... 243
Table 67 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 253
Table 68 Limited LAN to WAN IRC Traffic Example ............................................................................ 254
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 255
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 257
Table 71 SECURITY > FIREWALL > Rule Summary .......................................................................... 259
Table 72 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 262
Table 73 SECURITY > FIREWALL > Anti-Probing .............................................................................. 264
Table 74 SECURITY > FIREWALL > Threshold .................................................................................. 265
Table 75 SECURITY > FIREWALL > Service ...................................................................................... 266
Table 76 SECURITY > FIREWALL > Service > Add ........................................................................... 267
Table 77 SECURITY > IDP > General Setup ...................................................................................... 280
Table 78 SECURITY > IDP > Signature: Attack Types ........................................................................ 281
Table 79 SECURITY > IDP > Signature: Intrusion Severity ................................................................ 282
Table 80 SECURITY > IDP > Signature: Actions ................................................................................ 282
Table 81 SECURITY > IDP > Signature: Group View ......................................................................... 283
42
ZyWALL 5/35/70 Series User's Guide

Advertisement

Table of Contents
loading

Table of Contents