ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual page 12

Internet security appliance
Table of Contents

Advertisement

7.5 TCP/IP Priority (Metric) ....................................................................................130
7.7 Configuring Load Balancing .............................................................................133
7.9 WAN IP Address Assignment ...........................................................................138
7.10 DNS Server Address Assignment ..................................................................138
7.11 WAN MAC Address ........................................................................................139
7.14 Configuring Traffic Redirect ............................................................................150
7.17 Configuring Advanced Modem Setup ............................................................155
DMZ Screens ........................................................................................................ 158
8.2 Configuring DMZ ..............................................................................................158
8.5 DMZ Public IP Address Example .....................................................................164
8.6 DMZ Private and Public IP Address Example ..................................................165
Wireless LAN ........................................................................................................ 170
9.1 Wireless LAN Introduction ................................................................................170
9.6 Wireless Security .............................................................................................178
9.7 Security Parameters Summary ........................................................................180
9.8 WEP Encryption ...............................................................................................180
9.9 802.1x Overview ..............................................................................................181
9.10 Dynamic WEP Key Exchange ........................................................................182
9.11 Introduction to WPA ........................................................................................183
Table of Contents
7.4.2 Weighted Round Robin ...........................................................................129
7.4.3 Spillover ..................................................................................................129
7.7.1 Least Load First ......................................................................................134
7.7.2 Weighted Round Robin ...........................................................................135
7.7.3 Spillover ..................................................................................................135
7.12.1 WAN Ethernet Encapsulation ...............................................................139
7.12.2 PPPoE Encapsulation ...........................................................................142
7.12.3 PPTP Encapsulation .............................................................................146
7.16.1 AT Command Strings ............................................................................155
7.16.2 DTR Signal ...........................................................................................155
7.16.3 Response Strings ..................................................................................155
9.6.1 Encryption ...............................................................................................179
9.6.2 Authentication .........................................................................................179
9.6.3 Restricted Access ...................................................................................180
9.6.4 Hide ZyWALL Identity .............................................................................180
9.9.1 Introduction to RADIUS ..........................................................................181
9.9.1.1 Types of RADIUS Messages .........................................................181
9.9.2 EAP Authentication Overview .................................................................182
9.11.1 User Authentication ...............................................................................183
ZyWALL 5/35/70 Series User's Guide
12

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents