EasyManua.ls Logo

ZyXEL Communications ZYWALL 35 - Page 46

ZyXEL Communications ZYWALL 35
872 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Tables
ZyWALL 5/35/70 Series User’s Guide
46
Table 39 Load Balancing: Spillover ...................................................................................................... 178
Table 40 Private IP Address Ranges ................................................................................................... 179
Table 41 NETWORK > WAN > WAN (Ethernet Encapsulation) .......................................................... 181
Table 42 NETWORK > WAN > WAN (PPPoE Encapsulation) ............................................................ 184
Table 43 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................................... 187
Table 44 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies ......................................................... 190
Table 45 NETWORK > WAN > 3G (WAN 2) ........................................................................................ 192
Table 46 NETWORK > WAN > Traffic Redirect ................................................................................... 196
Table 47 NETWORK > WAN > Dial Backup ........................................................................................ 197
Table 48 NETWORK > WAN > Dial Backup > Edit .............................................................................. 201
Table 49 NETWORK > DMZ ................................................................................................................ 204
Table 50 NETWORK > DMZ > Static DHCP ........................................................................................ 207
Table 51 NETWORK > DMZ > IP Alias ............................................................................................... 208
Table 52 NETWORK > DMZ > Port Roles ............................................................................................211
Table 53 NETWORK > WLAN ............................................................................................................. 215
Table 54 NETWORK > WLAN > Static DHCP ..................................................................................... 217
Table 55 NETWORK > WLAN > IP Alias ............................................................................................. 218
Table 56 NETWORK > WLAN > Port Roles ........................................................................................ 220
Table 57 Wireless Security Relational Matrix ...................................................................................... 222
Table 58 WIRELESS > Wi-Fi > Wireless Card: No Security ................................................................ 229
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP ................................................................ 231
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK .................................................................. 232
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA .......................................................................... 233
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP ............................................ 234
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ................................................. 235
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ...................................................... 237
Table 65 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................... 238
Table 66 WIRELESS > Wi-Fi > MAC Filter .......................................................................................... 239
Table 67 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 253
Table 68 Limited LAN to WAN IRC Traffic Example ............................................................................ 254
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 256
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 258
Table 71 SECURITY > FIREWALL > Rule Summary .......................................................................... 260
Table 72 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 263
Table 73 SECURITY > FIREWALL > Anti-Probing .............................................................................. 265
Table 74 SECURITY > FIREWALL > Threshold .................................................................................. 267
Table 75 SECURITY > FIREWALL > Service ...................................................................................... 268
Table 76 SECURITY > FIREWALL > Service > Add ........................................................................... 269
Table 77 SECURITY > IDP > General Setup ...................................................................................... 281
Table 78 SECURITY > IDP > Signature: Attack Types ........................................................................ 282
Table 79 SECURITY > IDP > Signature: Intrusion Severity ................................................................ 283
Table 80 SECURITY > IDP > Signature: Actions ................................................................................ 284
Table 81 SECURITY > IDP > Signature: Group View ......................................................................... 285

Table of Contents

Other manuals for ZyXEL Communications ZYWALL 35

Related product manuals