ZyXEL Communications ZYWALL 35 User Manual page 34

Internet security appliance
Hide thumbs Also See for ZYWALL 35:
Table of Contents

Advertisement

List of Figures
Figure 125 WIRELESS > Wi-Fi > Wireless Card: WPA ........................................................................ 233
Figure 126 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP .......................................... 234
Figure 127 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ............................................... 235
Figure 128 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ................................................... 237
Figure 130 WIRELESS > Wi-Fi > MAC Filter ....................................................................................... 239
Figure 131 Default Firewall Action ........................................................................................................ 243
Figure 132 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 244
Figure 134 From LAN to VPN Example ............................................................................................... 247
Figure 136 From VPN to LAN Example ............................................................................................... 249
Figure 138 From VPN to VPN Example .............................................................................................. 251
Figure 140 Blocking All LAN to WAN IRC Traffic Example .................................................................. 253
Figure 141 Limited LAN to WAN IRC Traffic Example .......................................................................... 254
Figure 142 Using IP Alias to Solve the Triangle Route Problem .......................................................... 255
Figure 143 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 256
Figure 144 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 258
Figure 145 SECURITY > FIREWALL > Rule Summary ....................................................................... 260
Figure 146 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 262
Figure 147 SECURITY > FIREWALL > Anti-Probing ........................................................................... 264
Figure 148 Three-Way Handshake ....................................................................................................... 265
Figure 150 SECURITY > FIREWALL > Service ................................................................................... 268
Figure 151 SECURITY > FIREWALL > Service > Add ......................................................................... 269
Figure 152 My Service Firewall Rule Example: Service ...................................................................... 270
Figure 153 My Service Firewall Rule Example: Edit Custom Service ................................................. 270
Figure 154 My Service Firewall Rule Example: Rule Summary ........................................................... 271
Figure 155 My Service Firewall Rule Example: Rule Edit ................................................................... 271
Figure 156 My Service Firewall Rule Example: Rule Configuration ..................................................... 272
Figure 157 My Service Firewall Rule Example: Rule Summary ........................................................... 273
Figure 158 Network Intrusions ............................................................................................................. 275
Figure 159 Applying IDP to Interfaces .................................................................................................. 280
Figure 160 SECURITY > IDP > General .............................................................................................. 280
Figure 161 SECURITY > IDP > Signatures: Attack Types ................................................................... 282
Figure 162 SECURITY > IDP > Signature: Actions .............................................................................. 284
Figure 163 SECURITY > IDP > Signature: Group View ....................................................................... 284
Figure 164 SECURITY > IDP > Signature: Query View ....................................................................... 286
Figure 165 SECURITY > IDP > Signature: Query by Partial Name ..................................................... 289
Figure 167 Signature Query by Attribute. ............................................................................................. 290
34
....................................................... 245
............................................................... 248
............................................................... 250
............................................................... 252
............................................................................ 266
ZyWALL 5/35/70 Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents