beautypg.com

ZyXEL Communications Centralized Network Management Vantage CNM User Manual

Page 18

background image

Vantage CNM User’s Guide

18

Figure 39 Device Operation > Device Configuration > Network > WAN > WAN1/2 - PPTP (ZyNOS ZyWALL

with two WAN ports) ..................................................................................................... 83

Figure 40 Device Operation > Device Configuration > Network > WAN > Dial Backup (ZyNOS ZyWALL)

86

Figure 41 Device Operation > Device Configuration > Network > WAN > Dial Backup > Advanced (ZyNOS

ZyWALL) ....................................................................................................................... 88

Figure 42 Device Operation > Device Configuration > Network > WAN > Dial Backup > Edit (ZyNOS

ZyWALL) ....................................................................................................................... 90

Figure 43 Device Operation > Device Configuration > Network > WAN > Setup (Prestige) .................. 92

Figure 44 Device Operation > Device Configuration > Network > WAN > Backup (Prestige) ................ 95

Figure 45 Device Operation > Device Configuration > Network > WAN > Backup > Advanced (Prestige)

97

Figure 46 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card ..... 100

Figure 47 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card

(Advanced Wireless Security Settings) ....................................................................... 102

Figure 48 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter ........... 107

Figure 49 Example: Device Operation > Device Configuration > VPN > IPSec VPN (ZLD) ................ 109

Figure 50 Device Operation > Device Configuration > Security > Firewall > Default Rule ....................110

Figure 51 Device Operation > Device Configuration > Security > Firewall > Rule Summary ................112

Figure 52 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Edit .....114

Figure 53 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ....................116

Figure 54 Device Operation > Device Configuration > Security > Firewall > Threshold .......................117

Figure 55 Device Operation > Device Configuration > Security > Firewall > Service ...........................119

Figure 56 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 120

Figure 57 IPSec High Availability ......................................................................................................... 121

Figure 58 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) ................. 122

Figure 59 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway

Policy Add/Edit ........................................................................................................... 123

Figure 60 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy

Add/Edit ...................................................................................................................... 129

Figure 61 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy

Move ........................................................................................................................... 133

Figure 62 Device Operation > Device Configuration > VPN > Manual-Key IPSec ............................... 134

Figure 63 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit

136

Figure 64 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 139

Figure 65 Device Operation > Device Configuration > Security > Anti-Virus > General ....................... 141

Figure 66 Device Operation > Device Configuration > Security > Anti-Spam > General ..................... 143

Figure 67 Device Operation > Device Configuration > Security > Anti-Spam > External DB ............... 145

Figure 68 Device Operation > Device Configuration > Security > Anti-Spam > Lists ........................... 147

Figure 69 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit ......... 149

Figure 70 Device Operation > Device Configuration > Security > IDP > General ................................ 151

Figure 71 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 153

Figure 72 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 154

Figure 73 Device Operation > Device Configuration > Security > IDP > Signature ............................. 155