List of Figures
ZyWALL 5/35/70 Series User’s Guide
34
Figure 125 WIRELESS > Wi-Fi > Wireless Card: WPA ........................................................................ 233
Figure 126 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP .......................................... 234
Figure 127 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ............................................... 235
Figure 128 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ................................................... 237
Figure 129 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................. 238
Figure 130 WIRELESS > Wi-Fi > MAC Filter ....................................................................................... 239
Figure 131 Default Firewall Action ........................................................................................................ 243
Figure 132 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 244
Figure 133 Default Block Traffic From WAN1 to DMZ Example ....................................................... 245
Figure 134 From LAN to VPN Example ............................................................................................... 247
Figure 135 Block DMZ to VPN Traffic by Default Example ............................................................... 248
Figure 136 From VPN to LAN Example ............................................................................................... 249
Figure 137 Block VPN to LAN Traffic by Default Example ............................................................... 250
Figure 138 From VPN to VPN Example .............................................................................................. 251
Figure 139 Block VPN to VPN Traffic by Default Example ............................................................... 252
Figure 140 Blocking All LAN to WAN IRC Traffic Example .................................................................. 253
Figure 141 Limited LAN to WAN IRC Traffic Example .......................................................................... 254
Figure 142 Using IP Alias to Solve the Triangle Route Problem .......................................................... 255
Figure 143 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 256
Figure 144 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 258
Figure 145 SECURITY > FIREWALL > Rule Summary ....................................................................... 260
Figure 146 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 262
Figure 147 SECURITY > FIREWALL > Anti-Probing ........................................................................... 264
Figure 148 Three-Way Handshake ....................................................................................................... 265
Figure 149 SECURITY > FIREWALL > Threshold ............................................................................ 266
Figure 150 SECURITY > FIREWALL > Service ................................................................................... 268
Figure 151 SECURITY > FIREWALL > Service > Add ......................................................................... 269
Figure 152 My Service Firewall Rule Example: Service ...................................................................... 270
Figure 153 My Service Firewall Rule Example: Edit Custom Service ................................................. 270
Figure 154 My Service Firewall Rule Example: Rule Summary ........................................................... 271
Figure 155 My Service Firewall Rule Example: Rule Edit ................................................................... 271
Figure 156 My Service Firewall Rule Example: Rule Configuration ..................................................... 272
Figure 157 My Service Firewall Rule Example: Rule Summary ........................................................... 273
Figure 158 Network Intrusions ............................................................................................................. 275
Figure 159 Applying IDP to Interfaces .................................................................................................. 280
Figure 160 SECURITY > IDP > General .............................................................................................. 280
Figure 161 SECURITY > IDP > Signatures: Attack Types ................................................................... 282
Figure 162 SECURITY > IDP > Signature: Actions .............................................................................. 284
Figure 163 SECURITY > IDP > Signature: Group View ....................................................................... 284
Figure 164 SECURITY > IDP > Signature: Query View ....................................................................... 286
Figure 165 SECURITY > IDP > Signature: Query by Partial Name ..................................................... 289
Figure 166 SECURITY > IDP > Signature: Query by Complete ID ...................................................... 289
Figure 167 Signature Query by Attribute. ............................................................................................. 290
Summary of Contents for ZyWALL 35 Series
Page 2: ......
Page 8: ...Safety Warnings ZyWALL 5 35 70 Series User s Guide 8 ...
Page 52: ...List of Tables ZyWALL 5 35 70 Series User s Guide 52 ...
Page 54: ...54 ...
Page 60: ...Chapter 1 Getting to Know Your ZyWALL ZyWALL 5 35 70 Series User s Guide 60 ...
Page 86: ...Chapter 2 Introducing the Web Configurator ZyWALL 5 35 70 Series User s Guide 86 ...
Page 140: ...Chapter 4 Tutorials ZyWALL 5 35 70 Series User s Guide 140 ...
Page 146: ...Chapter 5 Registration ZyWALL 5 35 70 Series User s Guide 146 ...
Page 148: ...148 ...
Page 160: ...Chapter 6 LAN Screens ZyWALL 5 35 70 Series User s Guide 160 ...
Page 173: ...Chapter 8 WAN Screens ZyWALL 5 35 70 Series User s Guide 173 Figure 93 NETWORK WAN General ...
Page 202: ...Chapter 8 WAN Screens ZyWALL 5 35 70 Series User s Guide 202 ...
Page 212: ...Chapter 9 DMZ Screens ZyWALL 5 35 70 Series User s Guide 212 ...
Page 242: ...242 ...
Page 274: ...Chapter 11 Firewall ZyWALL 5 35 70 Series User s Guide 274 ...
Page 294: ...Chapter 13 Configuring IDP ZyWALL 5 35 70 Series User s Guide 294 ...
Page 320: ...Chapter 15 Anti Spam ZyWALL 5 35 70 Series User s Guide 320 ...
Page 342: ...Chapter 16 Content Filtering Screens ZyWALL 5 35 70 Series User s Guide 342 ...
Page 350: ...Chapter 17 Content Filtering Reports ZyWALL 5 35 70 Series User s Guide 350 ...
Page 424: ...Chapter 19 Certificates ZyWALL 5 35 70 Series User s Guide 424 ...
Page 430: ...430 ...
Page 448: ...Chapter 21 Network Address Translation NAT ZyWALL 5 35 70 Series User s Guide 448 ...
Page 474: ...Chapter 24 Bandwidth Management ZyWALL 5 35 70 Series User s Guide 474 ...
Page 514: ...Chapter 26 Remote Management ZyWALL 5 35 70 Series User s Guide 514 ...
Page 533: ...533 PART V Reports Logs and Maintenance Reports 535 Logs Screens 547 Maintenance 575 ...
Page 534: ...534 ...
Page 551: ...Chapter 31 Logs Screens ZyWALL 5 35 70 Series User s Guide 551 Figure 334 LOGS Log Settings ...
Page 592: ...Chapter 32 Maintenance ZyWALL 5 35 70 Series User s Guide 592 ...
Page 594: ...594 Troubleshooting 751 Product Specifications 757 ...
Page 602: ...Chapter 33 Introducing the SMT ZyWALL 5 35 70 Series User s Guide 602 ...
Page 622: ...Chapter 35 WAN and Dial Backup Setup ZyWALL 5 35 70 Series User s Guide 622 ...
Page 628: ...Chapter 36 LAN Setup ZyWALL 5 35 70 Series User s Guide 628 ...
Page 634: ...Chapter 37 Internet Access ZyWALL 5 35 70 Series User s Guide 634 ...
Page 638: ...Chapter 38 DMZ Setup ZyWALL 5 35 70 Series User s Guide 638 ...
Page 642: ...Chapter 39 Route Setup ZyWALL 5 35 70 Series User s Guide 642 ...
Page 658: ...Chapter 41 Remote Node Setup ZyWALL 5 35 70 Series User s Guide 658 ...
Page 662: ...Chapter 42 IP Static Route Setup ZyWALL 5 35 70 Series User s Guide 662 ...
Page 700: ...Chapter 45 Filter Configuration ZyWALL 5 35 70 Series User s Guide 700 ...
Page 738: ...Chapter 50 Remote Management ZyWALL 5 35 70 Series User s Guide 738 ...
Page 746: ...Chapter 51 IP Policy Routing ZyWALL 5 35 70 Series User s Guide 746 ...
Page 766: ...766 ...
Page 770: ...Appendix A Hardware Installation ZyWALL 5 35 70 Series User s Guide 770 ...
Page 780: ...Appendix C Removing and Installing a Fuse ZyWALL 5 35 70 Series User s Guide 780 ...
Page 802: ...Appendix D Setting up Your Computer s IP Address ZyWALL 5 35 70 Series User s Guide 802 ...
Page 816: ...Appendix F Common Services ZyWALL 5 35 70 Series User s Guide 816 ...
Page 852: ...Appendix J Importing Certificates ZyWALL 5 35 70 Series User s Guide 852 ...
Page 856: ...Appendix K Legal Information ZyWALL 5 35 70 Series User s Guide 856 ...
Page 862: ...Appendix L Customer Support ZyWALL 5 35 70 Series User s Guide 862 ...