beautypg.com

ZyXEL Communications Centralized Network Management Vantage CNM User Manual

Page 26

background image

Vantage CNM User’s Guide

26

Table 37 Wireless Card: No Access 802.1x + Static WEP .................................................................. 106

Table 38 Wireless Card: No Access 802.1x + No WEP ....................................................................... 106

Table 39 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter ............ 107

Table 40 Device Operation > Device Configuration > Security > Firewall > Default Rule ....................110

Table 41 Device Operation > Device Configuration > Security > Firewall > Rule Summary ................112

Table 42 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Add/Edit 115

Table 43 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ....................117

Table 44 Device Operation > Device Configuration > Security > Firewall > Threshold ........................118

Table 45 Device Operation > Device Configuration > Security > Firewall > Service ............................119

Table 46 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 120

Table 47 Device Operation > Device Configuration > Security > VPN > VPN Rules .......................... 122

Table 48 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway Policy

Add/Edit ..................................................................................................................... 124

Table 49 Device Operation > Device Configuration > VPN > IKE IPSec ............................................. 130

Table 50 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy

Move .......................................................................................................................... 134

Table 51 Configuration > VPN > Manual-Key IPSec ........................................................................... 135

Table 52 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit

136

Table 53 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 139

Table 54 Device Operation > Device Configuration > Security > Anti-Virus > General ....................... 141

Table 55 Device Operation > Device Configuration > Security > Anti-Spam > General ...................... 143

Table 56 Device Operation > Device Configuration > Security > Anti-Spam > External DB ................ 146

Table 57 Device Operation > Device Configuration > Security > Anti-Spam > Lists ............................ 147

Table 58 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit .......... 149

Table 59 Device Operation > Device Configuration > Security > IDP > General ................................. 151

Table 60 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 153

Table 61 Device Operation > Device Configuration > Security > IDP > Signature > Intrusion Severity 154

Table 62 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 155

Table 63 Device Operation > Device Configuration > Security > IDP > Signature .............................. 156

Table 64 Device Operation > Device Configuration > Security > IDP > Signature (Query View) ........ 157

Table 65 Device Operation > Device Configuration > Security > Signature Update ............................ 160

Table 66 Device Operation > Device Configuration > Security > Content Filter > General ................. 162

Table 67 Device Operation > Device Configuration > Security > Content Filter > Policy .................... 165

Table 68 Device Operation > Device Configuration > Security > Content Filter > Policy > Add/General ..

167

Table 69 Device Operation > Device Configuration > Security > Content Filter > Policy > External Database

168

Table 70 Device Operation > Device Configuration > Security > Content Filter > Policy > Customization

176

Table 71 Device Operation > Device Configuration > Security > Content Filter > Policy > Schedule . 178

Table 72 Device Operation > Device Configuration > Security > Content Filter > Object ................... 180

Table 73 Device Operation > Device Configuration > Security > Content Filter > Cache ................... 181

Table 74 Device Operation > Device Configuration > Security > X Auth > Local User ....................... 182