List of Tables
ZyWALL 5/35/70 Series User’s Guide
46
Table 39 Load Balancing: Spillover ...................................................................................................... 178
Table 40 Private IP Address Ranges ................................................................................................... 179
Table 41 NETWORK > WAN > WAN (Ethernet Encapsulation) .......................................................... 181
Table 42 NETWORK > WAN > WAN (PPPoE Encapsulation) ............................................................ 184
Table 43 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................................... 187
Table 44 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies ......................................................... 190
Table 45 NETWORK > WAN > 3G (WAN 2) ........................................................................................ 192
Table 46 NETWORK > WAN > Traffic Redirect ................................................................................... 196
Table 47 NETWORK > WAN > Dial Backup ........................................................................................ 197
Table 48 NETWORK > WAN > Dial Backup > Edit .............................................................................. 201
Table 49 NETWORK > DMZ ................................................................................................................ 204
Table 50 NETWORK > DMZ > Static DHCP ........................................................................................ 207
Table 51 NETWORK > DMZ > IP Alias ............................................................................................... 208
Table 52 NETWORK > DMZ > Port Roles ............................................................................................211
Table 53 NETWORK > WLAN ............................................................................................................. 215
Table 54 NETWORK > WLAN > Static DHCP ..................................................................................... 217
Table 55 NETWORK > WLAN > IP Alias ............................................................................................. 218
Table 56 NETWORK > WLAN > Port Roles ........................................................................................ 220
Table 57 Wireless Security Relational Matrix ...................................................................................... 222
Table 58 WIRELESS > Wi-Fi > Wireless Card: No Security ................................................................ 229
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP ................................................................ 231
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK .................................................................. 232
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA .......................................................................... 233
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP ............................................ 234
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ................................................. 235
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ...................................................... 237
Table 65 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................... 238
Table 66 WIRELESS > Wi-Fi > MAC Filter .......................................................................................... 239
Table 67 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 253
Table 68 Limited LAN to WAN IRC Traffic Example ............................................................................ 254
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 256
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 258
Table 71 SECURITY > FIREWALL > Rule Summary .......................................................................... 260
Table 72 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 263
Table 73 SECURITY > FIREWALL > Anti-Probing .............................................................................. 265
Table 74 SECURITY > FIREWALL > Threshold .................................................................................. 267
Table 75 SECURITY > FIREWALL > Service ...................................................................................... 268
Table 76 SECURITY > FIREWALL > Service > Add ........................................................................... 269
Table 77 SECURITY > IDP > General Setup ...................................................................................... 281
Table 78 SECURITY > IDP > Signature: Attack Types ........................................................................ 282
Table 79 SECURITY > IDP > Signature: Intrusion Severity ................................................................ 283
Table 80 SECURITY > IDP > Signature: Actions ................................................................................ 284
Table 81 SECURITY > IDP > Signature: Group View ......................................................................... 285