EasyManua.ls Logo

ZyXEL Communications 5 Series - Page 42

ZyXEL Communications 5 Series
824 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Tables
ZyWALL 5/35/70 Series User’s Guide
42
Table 39 Load Balancing: Weighted Round Robin .............................................................................. 180
Table 40 Load Balancing: Spillover ...................................................................................................... 181
Table 41 Private IP Address Ranges ................................................................................................... 182
Table 42 NETWORK > WAN > WAN (Ethernet Encapsulation) .......................................................... 184
Table 43 NETWORK > WAN > WAN (PPPoE Encapsulation) ............................................................ 187
Table 44 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................................... 190
Table 45 NETWORK > WAN > 3G (WAN 2) ........................................................................................ 194
Table 46 NETWORK > WAN > Traffic Redirect ................................................................................... 198
Table 47 NETWORK > WAN > Dial Backup ........................................................................................ 200
Table 48 NETWORK > WAN > Dial Backup > Edit .............................................................................. 203
Table 49 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies ......................................................... 204
Table 50 NETWORK > DMZ .................................................................................................................211
Table 51 NETWORK > DMZ > Static DHCP ........................................................................................ 214
Table 52 NETWORK > DMZ > IP Alias ............................................................................................... 215
Table 53 NETWORK > DMZ > Port Roles ...........................................................................................216
Table 54 NETWORK > WLAN ............................................................................................................. 221
Table 55 NETWORK > WLAN > Static DHCP ..................................................................................... 224
Table 56 NETWORK > WLAN > IP Alias ............................................................................................. 225
Table 57 NETWORK > WLAN > Port Roles ........................................................................................ 227
Table 58 WIRELESS > Wi-Fi > Wireless Card: No Security ................................................................ 233
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP ................................................................ 235
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK .................................................................. 236
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA .......................................................................... 237
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP ............................................ 238
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ................................................. 239
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ...................................................... 241
Table 65 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................... 242
Table 66 WIRELESS > Wi-Fi > MAC Filter .......................................................................................... 243
Table 67 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 253
Table 68 Limited LAN to WAN IRC Traffic Example ............................................................................ 254
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 255
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 257
Table 71 SECURITY > FIREWALL > Rule Summary .......................................................................... 259
Table 72 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 262
Table 73 SECURITY > FIREWALL > Anti-Probing .............................................................................. 264
Table 74 SECURITY > FIREWALL > Threshold .................................................................................. 265
Table 75 SECURITY > FIREWALL > Service ...................................................................................... 266
Table 76 SECURITY > FIREWALL > Service > Add ........................................................................... 267
Table 77 SECURITY > IDP > General Setup ...................................................................................... 280
Table 78 SECURITY > IDP > Signature: Attack Types ........................................................................ 281
Table 79 SECURITY > IDP > Signature: Intrusion Severity ................................................................ 282
Table 80 SECURITY > IDP > Signature: Actions ................................................................................ 282
Table 81 SECURITY > IDP > Signature: Group View ......................................................................... 283

Table of Contents

Related product manuals