List of Figures
ZyWALL 5/35/70 Series User’s Guide
34
Figure 125 WIRELESS > Wi-Fi > Wireless Card: WPA ........................................................................ 233
Figure 126 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP .......................................... 234
Figure 127 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ............................................... 235
Figure 128 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ................................................... 237
Figure 129 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................. 238
Figure 130 WIRELESS > Wi-Fi > MAC Filter .......................................................................................239
Figure 131 Default Firewall Action ........................................................................................................ 243
Figure 132 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 244
Figure 133 Default Block Traffic From WAN1 to DMZ Example ....................................................... 245
Figure 134 From LAN to VPN Example ............................................................................................... 247
Figure 135 Block DMZ to VPN Traffic by Default Example ............................................................... 248
Figure 136 From VPN to LAN Example ............................................................................................... 249
Figure 137 Block VPN to LAN Traffic by Default Example ............................................................... 250
Figure 138 From VPN to VPN Example .............................................................................................. 251
Figure 139 Block VPN to VPN Traffic by Default Example ............................................................... 252
Figure 140 Blocking All LAN to WAN IRC Traffic Example .................................................................. 253
Figure 141 Limited LAN to WAN IRC Traffic Example .......................................................................... 254
Figure 142 Using IP Alias to Solve the Triangle Route Problem .......................................................... 255
Figure 143 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 256
Figure 144 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 258
Figure 145 SECURITY > FIREWALL > Rule Summary ....................................................................... 260
Figure 146 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 262
Figure 147 SECURITY > FIREWALL > Anti-Probing ........................................................................... 264
Figure 148 Three-Way Handshake ....................................................................................................... 265
Figure 149 SECURITY > FIREWALL > Threshold ............................................................................ 266
Figure 150 SECURITY > FIREWALL > Service ................................................................................... 268
Figure 151 SECURITY > FIREWALL > Service > Add ......................................................................... 269
Figure 152 My Service Firewall Rule Example: Service ...................................................................... 270
Figure 153 My Service Firewall Rule Example: Edit Custom Service ................................................. 270
Figure 154 My Service Firewall Rule Example: Rule Summary ........................................................... 271
Figure 155 My Service Firewall Rule Example: Rule Edit ................................................................... 271
Figure 156 My Service Firewall Rule Example: Rule Configuration ..................................................... 272
Figure 157 My Service Firewall Rule Example: Rule Summary ........................................................... 273
Figure 158 Network Intrusions ............................................................................................................. 275
Figure 159 Applying IDP to Interfaces .................................................................................................. 280
Figure 160 SECURITY > IDP > General .............................................................................................. 280
Figure 161 SECURITY > IDP > Signatures: Attack Types ................................................................... 282
Figure 162 SECURITY > IDP > Signature: Actions .............................................................................. 284
Figure 163 SECURITY > IDP > Signature: Group View ....................................................................... 284
Figure 164 SECURITY > IDP > Signature: Query View ....................................................................... 286
Figure 165 SECURITY > IDP > Signature: Query by Partial Name ..................................................... 289
Figure 166 SECURITY > IDP > Signature: Query by Complete ID ...................................................... 289
Figure 167 Signature Query by Attribute. ............................................................................................. 290