beautypg.com

ZyXEL Communications 5 Series User Manual

Page 46

background image

ZyWALL 5/35/70 Series User’s Guide

46

List of Tables

Table 39 Example of Network Properties for LAN Servers with Fixed IP Addresses ......... 160

Table 40 NETWORK > WAN > WAN (Ethernet Encapsulation) ......................................... 161

Table 41 NETWORK > WAN > WAN (PPPoE Encapsulation) ........................................... 165

Table 42 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................. 168

Table 43 NETWORK > WAN > Traffic Redirect .................................................................. 171

Table 44 NETWORK > WAN > Dial Backup ....................................................................... 173

Table 45 NETWORK > WAN > Dial Backup > Edit ............................................................ 176

Table 46 NETWORK > DMZ .............................................................................................. 180

Table 47 NETWORK > DMZ > Static DHCP ...................................................................... 183

Table 48 NETWORK > DMZ > IP Alias .............................................................................. 184

Table 49 NETWORK > DMZ > Port Roles ......................................................................... 188

Table 50 NETWORK > WLAN ............................................................................................ 190

Table 51 NETWORK > WLAN > Static DHCP .................................................................... 193

Table 52 NETWORK > WLAN > IP Alias ........................................................................... 194

Table 53 NETWORK > WLAN > Port Roles ....................................................................... 197

Table 54 Wireless Security Relational Matrix ..................................................................... 199

Table 55 NETWORK > WIRELESS CARD: No Security .................................................... 206

Table 56 NETWORK > WIRELESS CARD: Static WEP .................................................... 208

Table 57 NETWORK > WIRELESS CARD: WPA-PSK ...................................................... 209

Table 58 NETWORK > WIRELESS CARD: WPA .............................................................. 210

Table 59 NETWORK > WIRELESS CARD: 802.1x + Dynamic WEP ................................ 212

Table 60 NETWORK > WIRELESS CARD: 802.1x + Static WEP ..................................... 213

Table 61 NETWORK > WIRELESS CARD: 802.1x + No WEP .......................................... 215

Table 62 NETWORK > WIRELESS CARD: No Access 802.1x + Static WEP ................... 216

Table 63 NETWORK > WIRELESS CARD: MAC Address Filter ....................................... 217

Table 64 Blocking All LAN to WAN IRC Traffic Example .................................................... 227

Table 65 Limited LAN to WAN IRC Traffic Example ........................................................... 228

Table 66 SECURITY > FIREWALL > Default Rule (Router Mode) .................................... 231

Table 67 SECURITY > FIREWALL > Default Rule (Bridge Mode) ..................................... 233

Table 68 SECURITY > FIREWALL > Rule Summary ......................................................... 234

Table 69 SECURITY > FIREWALL > Rule Summary > Edit .............................................. 237

Table 70 SECURITY > FIREWALL > Anti-Probing ............................................................. 239

Table 71 SECURITY > FIREWALL > Threshold ................................................................ 241

Table 72 SECURITY > FIREWALL > Service .................................................................... 243

Table 73 SECURITY > FIREWALL > Service > Add .......................................................... 244

Table 74 SECURITY > IDP > General Setup ..................................................................... 256

Table 75 SECURITY > IDP > Signature: Attack Types ...................................................... 258

Table 76 SECURITY > IDP > Signature: Intrusion Severity ............................................... 259

Table 77 SECURITY > IDP > Signature: Actions ............................................................... 260

Table 78 SECURITY > IDP > Signature: Group View ........................................................ 261

Table 79 SECURITY > IDP > Signature: Query View ........................................................ 263

Table 80 SECURITY > IDP > Update ................................................................................. 268

Table 81 Common Computer Virus Types ......................................................................... 271