beautypg.com

ZyXEL Communications 70 Series User Manual

Page 34

background image

ZyWALL 5/35/70 Series User’s Guide

List of Figures

34

Figure 82 Wireless Card: WPA-PSK ................................................................................... 194
Figure 83 Wireless Card: WPA ........................................................................................... 195
Figure 84 Wireless Card: 802.1x + Dynamic WEP ............................................................. 196
Figure 85 Wireless Card: 802.1x + Static WEP ................................................................... 197
Figure 86 Wireless Card: 802.1x + No WEP ....................................................................... 198
Figure 87 Wireless Card: No Access 802.1x + Static WEP ................................................ 199
Figure 88 Wireless Card: MAC Address Filter .................................................................... 201
Figure 89 ZyWALL Firewall Application .............................................................................. 204
Figure 90 Three-Way Handshake ....................................................................................... 205
Figure 91 SYN Flood ........................................................................................................... 206
Figure 92 Smurf Attack ....................................................................................................... 207
Figure 93 Stateful Inspection ............................................................................................... 209
Figure 94 LAN to WAN Traffic ............................................................................................. 218
Figure 95 WAN to LAN Traffic ............................................................................................. 218
Figure 96 Default Rule (Router Mode) ................................................................................ 219
Figure 97 Default Rule (Bridge Mode) ................................................................................ 221
Figure 98 Rule Summary .................................................................................................... 222
Figure 99 Firewall Edit Rule ................................................................................................ 224
Figure 100 Anti-Probing ...................................................................................................... 226
Figure 101 Firewall Threshold ............................................................................................. 229
Figure 102 Firewall Service ................................................................................................. 231
Figure 103 Firewall Edit Custom Service ............................................................................ 232
Figure 104 Service .............................................................................................................. 236
Figure 105 Edit Custom Service Example .......................................................................... 236
Figure 106 Rule Summary .................................................................................................. 237
Figure 107 Rule Edit Example ............................................................................................ 237
Figure 108 My Service Rule Configuration ......................................................................... 238
Figure 109 My Service Example Rule Summary ................................................................ 239
Figure 110 Network Intrusions ........................................................................................... 240
Figure 111 Applying IDP to Interfaces ................................................................................. 245
Figure 112 IDP: General ..................................................................................................... 246
Figure 113 Attack Types ...................................................................................................... 247
Figure 114 Signature Actions .............................................................................................. 249
Figure 115 IDP: Signatures ................................................................................................. 250
Figure 116 Signature Query by Partial Name ..................................................................... 252
Figure 117 Signature Query by Complete ID ...................................................................... 253
Figure 118 Signature Query by Attribute. ............................................................................ 254
Figure 119 Signatures Update ............................................................................................ 255
Figure 120 IDP: Backup & Restore ..................................................................................... 257
Figure 121 ZyWALL Anti-virus Example .......................................................................... 260
Figure 122 Anti-Virus: General ........................................................................................... 261
Figure 123 Anti-Virus: Update ............................................................................................. 264
Figure 124 Anti-spam External Database Example ............................................................ 268

This manual is related to the following products: