beautypg.com

ZyXEL Communications 5 Series User Manual

Page 33

background image

ZyWALL 5/35/70 Series User’s Guide

List of Figures

33

Figure 82 DMZ Private and Public Address Example ......................................................... 187

Figure 83 NETWORK > DMZ > Port Roles ........................................................................ 188

Figure 84 NETWORK > WLAN .......................................................................................... 190

Figure 85 NETWORK > WLAN > Static DHCP .................................................................. 193

Figure 86 NETWORK > WLAN > IP Alias .......................................................................... 194

Figure 87 WLAN Port Role Example .................................................................................. 196

Figure 88 NETWORK > WLAN > Port Roles ..................................................................... 196

Figure 89 NETWORK > WLAN > Port Roles: Change Complete ....................................... 197

Figure 90 ZyWALL Wireless Security Levels ...................................................................... 198

Figure 91 EAP Authentication ............................................................................................. 201

Figure 92 WPA-PSK Authentication .................................................................................... 204

Figure 93 WPA with RADIUS Application Example ............................................................ 205

Figure 94 NETWORK > WIRELESS CARD: No Security ................................................... 206

Figure 95 NETWORK > WIRELESS CARD: Static WEP .................................................... 208

Figure 96 NETWORK > WIRELESS CARD: WPA-PSK ..................................................... 209

Figure 97 NETWORK > WIRELESS CARD: WPA .............................................................. 210

Figure 98 NETWORK > WIRELESS CARD: 802.1x + Dynamic WEP ................................ 211

Figure 99 NETWORK > WIRELESS CARD: 802.1x + Static WEP ..................................... 213

Figure 100 NETWORK > WIRELESS CARD: 802.1x + No WEP ....................................... 214

Figure 101 NETWORK > WIRELESS CARD: No Access 802.1x + Static WEP ................. 216

Figure 102 NETWORK > WIRELESS CARD: MAC Address Filter ..................................... 217

Figure 103 Default Firewall Action ...................................................................................... 219

Figure 104 SECURITY > FIREWALL > Default Rule (Router Mode) .................................. 220

Figure 105 Default Block Traffic From WAN1 to DMZ Example ...................................... 221

Figure 106 From LAN to VPN Example ............................................................................. 223

Figure 107 Block DMZ to VPN Traffic by Default Example .............................................. 223

Figure 108 From VPN to LAN Example ............................................................................. 224

Figure 109 Block VPN to LAN Traffic by Default Example .............................................. 225

Figure 110 From VPN to VPN Example ............................................................................. 226

Figure 111 Block VPN to VPN Traffic by Default Example .............................................. 226

Figure 112 Blocking All LAN to WAN IRC Traffic Example ................................................ 227

Figure 113 Limited LAN to WAN IRC Traffic Example ........................................................ 228

Figure 114 Using IP Alias to Solve the Triangle Route Problem ......................................... 230

Figure 115 SECURITY > FIREWALL > Default Rule (Router Mode) .................................. 230

Figure 116 SECURITY > FIREWALL > Default Rule (Bridge Mode) ................................. 232

Figure 117 SECURITY > FIREWALL > Rule Summary ...................................................... 234

Figure 118 SECURITY > FIREWALL > Rule Summary > Edit ........................................... 236

Figure 119 SECURITY > FIREWALL > Anti-Probing .......................................................... 238

Figure 120 Three-Way Handshake ..................................................................................... 239

Figure 121 SECURITY > FIREWALL > Threshold ........................................................... 240

Figure 122 SECURITY > FIREWALL > Service .................................................................. 243

Figure 123 Firewall Edit Custom Service ............................................................................ 244

Figure 124 My Service Firewall Rule Example: Service .................................................... 245