EasyManua.ls Logo

ZyXEL Communications ZYWALL 35 - Page 34

ZyXEL Communications ZYWALL 35
872 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
ZyWALL 5/35/70 Series User’s Guide
34
Figure 125 WIRELESS > Wi-Fi > Wireless Card: WPA ........................................................................ 233
Figure 126 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP .......................................... 234
Figure 127 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ............................................... 235
Figure 128 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ................................................... 237
Figure 129 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................. 238
Figure 130 WIRELESS > Wi-Fi > MAC Filter .......................................................................................239
Figure 131 Default Firewall Action ........................................................................................................ 243
Figure 132 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 244
Figure 133 Default Block Traffic From WAN1 to DMZ Example ....................................................... 245
Figure 134 From LAN to VPN Example ............................................................................................... 247
Figure 135 Block DMZ to VPN Traffic by Default Example ............................................................... 248
Figure 136 From VPN to LAN Example ............................................................................................... 249
Figure 137 Block VPN to LAN Traffic by Default Example ............................................................... 250
Figure 138 From VPN to VPN Example .............................................................................................. 251
Figure 139 Block VPN to VPN Traffic by Default Example ............................................................... 252
Figure 140 Blocking All LAN to WAN IRC Traffic Example .................................................................. 253
Figure 141 Limited LAN to WAN IRC Traffic Example .......................................................................... 254
Figure 142 Using IP Alias to Solve the Triangle Route Problem .......................................................... 255
Figure 143 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 256
Figure 144 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 258
Figure 145 SECURITY > FIREWALL > Rule Summary ....................................................................... 260
Figure 146 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 262
Figure 147 SECURITY > FIREWALL > Anti-Probing ........................................................................... 264
Figure 148 Three-Way Handshake ....................................................................................................... 265
Figure 149 SECURITY > FIREWALL > Threshold ............................................................................ 266
Figure 150 SECURITY > FIREWALL > Service ................................................................................... 268
Figure 151 SECURITY > FIREWALL > Service > Add ......................................................................... 269
Figure 152 My Service Firewall Rule Example: Service ...................................................................... 270
Figure 153 My Service Firewall Rule Example: Edit Custom Service ................................................. 270
Figure 154 My Service Firewall Rule Example: Rule Summary ........................................................... 271
Figure 155 My Service Firewall Rule Example: Rule Edit ................................................................... 271
Figure 156 My Service Firewall Rule Example: Rule Configuration ..................................................... 272
Figure 157 My Service Firewall Rule Example: Rule Summary ........................................................... 273
Figure 158 Network Intrusions ............................................................................................................. 275
Figure 159 Applying IDP to Interfaces .................................................................................................. 280
Figure 160 SECURITY > IDP > General .............................................................................................. 280
Figure 161 SECURITY > IDP > Signatures: Attack Types ................................................................... 282
Figure 162 SECURITY > IDP > Signature: Actions .............................................................................. 284
Figure 163 SECURITY > IDP > Signature: Group View ....................................................................... 284
Figure 164 SECURITY > IDP > Signature: Query View ....................................................................... 286
Figure 165 SECURITY > IDP > Signature: Query by Partial Name ..................................................... 289
Figure 166 SECURITY > IDP > Signature: Query by Complete ID ...................................................... 289
Figure 167 Signature Query by Attribute. ............................................................................................. 290

Table of Contents

Other manuals for ZyXEL Communications ZYWALL 35

Related product manuals