ZyXEL Communications ZyWall 35 User Manual page 28

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide
Figure 37 Wireless: Static WEP .......................................................................................... 123
Figure 38 Wireless: WPA-PSK ............................................................................................ 124
Figure 39 Wireless: WPA .................................................................................................... 125
Figure 40 Wireless: 802.1x + Dynamic WEP ...................................................................... 126
Figure 41 Wireless: 802.1x + Static WEP ........................................................................... 128
Figure 42 Wireless: 802.1x + No WEP ............................................................................... 129
Figure 43 Wireless: No Access 802.1x + Static WEP ......................................................... 130
Figure 44 MAC Address Filter ............................................................................................. 132
Figure 45 EAP Authentication ............................................................................................. 134
Figure 46 Local User Database .......................................................................................... 136
Figure 47 RADIUS .............................................................................................................. 137
Figure 48 Least Load First Example .................................................................................. 141
Figure 49 Weighted Round Robin Algorithm Example ........................................................ 142
Figure 50 Spillover Algorithm Example ............................................................................... 143
Figure 51 General ............................................................................................................... 144
Figure 52 Load Balancing: Least Load First ....................................................................... 147
Figure 53 Load Balancing: Weighted Round Robin ............................................................ 148
Figure 54 Load Balancing: Spillover ................................................................................... 149
Figure 55 WAN: Ethernet Encapsulation ............................................................................. 150
Figure 56 WAN: PPPoE Encapsulation ............................................................................... 153
Figure 57 WAN: PPTP Encapsulation ................................................................................. 155
Figure 58 Traffic Redirect WAN Setup ................................................................................ 157
Figure 59 Traffic Redirect LAN Setup ................................................................................. 157
Figure 60 Traffic Redirect .................................................................................................... 158
Figure 61 Dial Backup Setup .............................................................................................. 159
Figure 62 Advanced Setup .................................................................................................. 163
Figure 63 DMZ .................................................................................................................... 166
Figure 64 IP Alias ................................................................................................................ 168
Figure 65 DMZ Public Address Example ............................................................................ 169
Figure 66 DMZ Private and Public Address Example ......................................................... 170
Figure 67 Port Roles ........................................................................................................... 171
Figure 68 Port Roles Change Complete ............................................................................. 171
Figure 69 ZyWALL Firewall Application .............................................................................. 175
Figure 70 Three-Way Handshake ....................................................................................... 176
Figure 71 SYN Flood ........................................................................................................... 177
Figure 72 Smurf Attack ....................................................................................................... 178
Figure 73 Stateful Inspection ............................................................................................... 180
Figure 74 LAN to WAN Traffic ............................................................................................. 188
Figure 75 WAN to LAN Traffic ............................................................................................. 189
Figure 76 Default Rule (Router Mode) ................................................................................ 190
Figure 77 Default Rule (Bridge Mode) ................................................................................ 191
Figure 78 Rule Summary .................................................................................................... 192
Figure 79 Creating/Editing A Firewall Rule ......................................................................... 194
26

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 70

Table of Contents