EasyManua.ls Logo

ZyXEL Communications 5 Series - Page 32

ZyXEL Communications 5 Series
824 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
ZyWALL 5/35/70 Series User’s Guide
32
Figure 125 WLAN Port Role Example ................................................................................................. 226
Figure 126 NETWORK > WLAN > Port Roles ..................................................................................... 227
Figure 127 NETWORK > WLAN > Port Roles: Change Complete ....................................................... 227
Figure 128 WLAN Overview ................................................................................................................. 229
Figure 129 ZyWALL Wireless Security Levels ...................................................................................... 230
Figure 130 WIRELESS > Wi-Fi > Wireless Card: No Security ............................................................. 232
Figure 131 WIRELESS > Wi-Fi > Wireless Card: Static WEP .............................................................. 235
Figure 132 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK ............................................................... 236
Figure 133 WIRELESS > Wi-Fi > Wireless Card: WPA ........................................................................ 237
Figure 134 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP .......................................... 238
Figure 135 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ............................................... 239
Figure 136 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ................................................... 241
Figure 137 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................. 242
Figure 138 WIRELESS > Wi-Fi > MAC Filter .......................................................................................243
Figure 139 EAP Authentication ............................................................................................................ 245
Figure 140 WPA-PSK Authentication ................................................................................................... 246
Figure 141 WPA with RADIUS Application Example ............................................................................ 247
Figure 142 Default Firewall Action ........................................................................................................ 251
Figure 143 Blocking All LAN to WAN IRC Traffic Example .................................................................. 253
Figure 144 Limited LAN to WAN IRC Traffic Example .......................................................................... 254
Figure 145 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 255
Figure 146 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 257
Figure 147 SECURITY > FIREWALL > Rule Summary ....................................................................... 259
Figure 148 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 261
Figure 149 SECURITY > FIREWALL > Anti-Probing ........................................................................... 263
Figure 150 SECURITY > FIREWALL > Threshold ............................................................................ 264
Figure 151 SECURITY > FIREWALL > Service ................................................................................... 266
Figure 152 SECURITY > FIREWALL > Service > Add ......................................................................... 267
Figure 153 My Service Firewall Rule Example: Service ...................................................................... 268
Figure 154 My Service Firewall Rule Example: Edit Custom Service ................................................. 268
Figure 155 My Service Firewall Rule Example: Rule Summary ........................................................... 269
Figure 156 My Service Firewall Rule Example: Rule Edit ................................................................... 269
Figure 157 My Service Firewall Rule Example: Rule Configuration ..................................................... 270
Figure 158 My Service Firewall Rule Example: Rule Summary ........................................................... 271
Figure 159 From LAN to VPN Example ............................................................................................... 273
Figure 160 From VPN to LAN Example ............................................................................................... 273
Figure 161 From VPN to VPN Example .............................................................................................. 274
Figure 162 Using IP Alias to Solve the Triangle Route Problem .......................................................... 275
Figure 163 Three-Way Handshake ....................................................................................................... 275
Figure 164 Network Intrusions ............................................................................................................. 277
Figure 165 Applying IDP to Interfaces .................................................................................................. 278
Figure 166 SECURITY > IDP > General .............................................................................................. 279
Figure 167 SECURITY > IDP > Signature: Group View ....................................................................... 283

Table of Contents

Related product manuals