ZyXEL Communications 70 Series User Manual
Page 45

ZyWALL 5/35/70 Series User’s Guide
45
List of Tables
Table 39 WAN: Ethernet Encapsulation ............................................................................. 144
Table 40 WAN: PPPoE Encapsulation ............................................................................... 148
Table 41 WAN: PPTP Encapsulation ................................................................................. 151
Table 42 Traffic Redirect .................................................................................................... 154
Table 43 Dial Backup ......................................................................................................... 157
Table 44 Advanced Setup .................................................................................................. 160
Table 45 DMZ ..................................................................................................................... 163
Table 46 DMZ Static DHCP ................................................................................................ 166
Table 47 DMZ: IP Alias ....................................................................................................... 167
Table 48 DMZ: Port Roles .................................................................................................. 172
Table 49 WLAN .................................................................................................................. 175
Table 50 WLAN Static DHCP ............................................................................................. 178
Table 51 WLAN IP Alias ..................................................................................................... 179
Table 52 WLAN Port Roles ................................................................................................ 181
Table 53 Wireless Security Relational Matrix ..................................................................... 184
Table 54 Wireless Card: No Security ................................................................................. 191
Table 55 Wireless Card: Static WEP .................................................................................. 193
Table 56 Wireless Card: WPA-PSK .................................................................................... 194
Table 57 Wireless Card: WPA ............................................................................................ 195
Table 58 Wireless Card: 802.1x + Dynamic WEP .............................................................. 196
Table 59 Wireless Card: 802.1x + Static WEP ................................................................... 197
Table 60 Wireless Card: 802.1x + No WEP ....................................................................... 199
Table 61 Wireless Card: No Access 802.1x + Static WEP ................................................. 200
Table 62 Wireless Card: MAC Address Filter ..................................................................... 201
Table 63 Common IP Ports ................................................................................................ 204
Table 64 ICMP Commands That Trigger Alerts .................................................................. 207
Table 65 Legal NetBIOS Commands ................................................................................. 207
Table 66 Legal SMTP Commands ..................................................................................... 208
Table 67 Default Rule (Router Mode) ................................................................................. 219
Table 68 Default Rule (Bridge Mode) ................................................................................. 221
Table 69 Rule Summary ..................................................................................................... 222
Table 70 Firewall Edit Rule ................................................................................................. 225
Table 71 Anti-Probing ......................................................................................................... 226
Table 72 Firewall Threshold ............................................................................................... 229
Table 73 Firewall Service ................................................................................................... 231
Table 74 Firewall Edit Custom Service ............................................................................... 232
Table 75 Predefined Services ............................................................................................ 233
Table 76 IDP: General Setup ............................................................................................. 246
Table 77 Attack Types ........................................................................................................ 247
Table 78 Intrusion Severity ................................................................................................. 248
Table 79 Signature Actions ................................................................................................ 249
Table 80 IDP Signatures: Group View ................................................................................ 250
Table 81 Signatures Update ............................................................................................... 256