ZyWALL 5 Internet Security Appliance
6.10
Configuring 802.1X ....................................................................................................... 6-8
6.11
Authentication Server..................................................................................................... 6-9
6.12
6.13
Configuring RADIUS .................................................................................................. 6-11
WAN and DMZ ................................................................................................................................... III
Chapter 7 WAN Screens................................................................................................................ 7-1
7.1
WAN Overview.................................................................................................................. 7-1
7.2
TCP/IP Priority (Metric)..................................................................................................... 7-1
7.3
Configuring Route .............................................................................................................. 7-1
7.4
Configuring WAN Setup .................................................................................................... 7-2
7.5
Traffic Redirect ................................................................................................................ 7-10
7.6
7.7
Configuring Dial Backup.................................................................................................. 7-12
7.8
Advanced Modem Setup .................................................................................................. 7-16
7.9
7.10
Dynamic DNS .............................................................................................................. 7-18
7.11
Configuring Dynamic DNS.......................................................................................... 7-18
Chapter 8 DMZ Screens ................................................................................................................ 8-1
8.1
DMZ Overview .................................................................................................................. 8-1
8.2
Configuring DMZ............................................................................................................... 8-1
8.3
Configuring IP Alias........................................................................................................... 8-3
8.4
Configuring Port Roles....................................................................................................... 8-5
8.5
8.6
Chapter 9 Firewalls........................................................................................................................ 9-1
9.1
Firewall Overview .............................................................................................................. 9-1
9.2
Types of Firewalls .............................................................................................................. 9-1
9.3
9.4
Denial of Service ................................................................................................................ 9-3
9.5
Stateful Inspection .............................................................................................................. 9-6
9.6
9.7
Chapter 10 Firewall Screens ....................................................................................................... 10-1
10.1
Access Methods ........................................................................................................... 10-1
10.2
10.3
Rule Logic Overview ................................................................................................... 10-2
10.4
10.5
Alerts ............................................................................................................................ 10-4
10.6
Configuring Firewall .................................................................................................... 10-4
10.7
Example Firewall Rule............................................................................................... 10-11
10.8
Predefined Services .................................................................................................... 10-15
10.9
Anti-Probing............................................................................................................... 10-17
10.10
Configuring Attack Alert ........................................................................................... 10-18
11.1
11.2
11.3
11.4
11.5
11.6
viii
Table of Content