List of Tables
ZyWALL 5/35/70 Series User’s Guide
46
Table 39 Load Balancing: Spillover ...................................................................................................... 178
Table 40 Private IP Address Ranges ................................................................................................... 179
Table 41 NETWORK > WAN > WAN (Ethernet Encapsulation) .......................................................... 181
Table 42 NETWORK > WAN > WAN (PPPoE Encapsulation) ............................................................ 184
Table 43 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................................... 187
Table 44 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies ......................................................... 190
Table 45 NETWORK > WAN > 3G (WAN 2) ........................................................................................ 192
Table 46 NETWORK > WAN > Traffic Redirect ................................................................................... 196
Table 47 NETWORK > WAN > Dial Backup ........................................................................................ 197
Table 48 NETWORK > WAN > Dial Backup > Edit .............................................................................. 201
Table 49 NETWORK > DMZ ................................................................................................................ 204
Table 50 NETWORK > DMZ > Static DHCP ........................................................................................ 207
Table 51 NETWORK > DMZ > IP Alias ............................................................................................... 208
Table 52 NETWORK > DMZ > Port Roles ............................................................................................211
Table 53 NETWORK > WLAN ............................................................................................................. 215
Table 54 NETWORK > WLAN > Static DHCP ..................................................................................... 217
Table 55 NETWORK > WLAN > IP Alias ............................................................................................. 218
Table 56 NETWORK > WLAN > Port Roles ........................................................................................ 220
Table 57 Wireless Security Relational Matrix ...................................................................................... 222
Table 58 WIRELESS > Wi-Fi > Wireless Card: No Security ................................................................ 229
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP ................................................................ 231
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK .................................................................. 232
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA .......................................................................... 233
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP ............................................ 234
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP ................................................. 235
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP ...................................................... 237
Table 65 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP ............................... 238
Table 66 WIRELESS > Wi-Fi > MAC Filter .......................................................................................... 239
Table 67 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 253
Table 68 Limited LAN to WAN IRC Traffic Example ............................................................................ 254
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 256
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 258
Table 71 SECURITY > FIREWALL > Rule Summary .......................................................................... 260
Table 72 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 263
Table 73 SECURITY > FIREWALL > Anti-Probing .............................................................................. 265
Table 74 SECURITY > FIREWALL > Threshold .................................................................................. 267
Table 75 SECURITY > FIREWALL > Service ...................................................................................... 268
Table 76 SECURITY > FIREWALL > Service > Add ........................................................................... 269
Table 77 SECURITY > IDP > General Setup ...................................................................................... 281
Table 78 SECURITY > IDP > Signature: Attack Types ........................................................................ 282
Table 79 SECURITY > IDP > Signature: Intrusion Severity ................................................................ 283
Table 80 SECURITY > IDP > Signature: Actions ................................................................................ 284
Table 81 SECURITY > IDP > Signature: Group View ......................................................................... 285
Summary of Contents for ZyWALL 35 Series
Page 2: ......
Page 8: ...Safety Warnings ZyWALL 5 35 70 Series User s Guide 8 ...
Page 52: ...List of Tables ZyWALL 5 35 70 Series User s Guide 52 ...
Page 54: ...54 ...
Page 60: ...Chapter 1 Getting to Know Your ZyWALL ZyWALL 5 35 70 Series User s Guide 60 ...
Page 86: ...Chapter 2 Introducing the Web Configurator ZyWALL 5 35 70 Series User s Guide 86 ...
Page 140: ...Chapter 4 Tutorials ZyWALL 5 35 70 Series User s Guide 140 ...
Page 146: ...Chapter 5 Registration ZyWALL 5 35 70 Series User s Guide 146 ...
Page 148: ...148 ...
Page 160: ...Chapter 6 LAN Screens ZyWALL 5 35 70 Series User s Guide 160 ...
Page 173: ...Chapter 8 WAN Screens ZyWALL 5 35 70 Series User s Guide 173 Figure 93 NETWORK WAN General ...
Page 202: ...Chapter 8 WAN Screens ZyWALL 5 35 70 Series User s Guide 202 ...
Page 212: ...Chapter 9 DMZ Screens ZyWALL 5 35 70 Series User s Guide 212 ...
Page 242: ...242 ...
Page 274: ...Chapter 11 Firewall ZyWALL 5 35 70 Series User s Guide 274 ...
Page 294: ...Chapter 13 Configuring IDP ZyWALL 5 35 70 Series User s Guide 294 ...
Page 320: ...Chapter 15 Anti Spam ZyWALL 5 35 70 Series User s Guide 320 ...
Page 342: ...Chapter 16 Content Filtering Screens ZyWALL 5 35 70 Series User s Guide 342 ...
Page 350: ...Chapter 17 Content Filtering Reports ZyWALL 5 35 70 Series User s Guide 350 ...
Page 424: ...Chapter 19 Certificates ZyWALL 5 35 70 Series User s Guide 424 ...
Page 430: ...430 ...
Page 448: ...Chapter 21 Network Address Translation NAT ZyWALL 5 35 70 Series User s Guide 448 ...
Page 474: ...Chapter 24 Bandwidth Management ZyWALL 5 35 70 Series User s Guide 474 ...
Page 514: ...Chapter 26 Remote Management ZyWALL 5 35 70 Series User s Guide 514 ...
Page 533: ...533 PART V Reports Logs and Maintenance Reports 535 Logs Screens 547 Maintenance 575 ...
Page 534: ...534 ...
Page 551: ...Chapter 31 Logs Screens ZyWALL 5 35 70 Series User s Guide 551 Figure 334 LOGS Log Settings ...
Page 592: ...Chapter 32 Maintenance ZyWALL 5 35 70 Series User s Guide 592 ...
Page 594: ...594 Troubleshooting 751 Product Specifications 757 ...
Page 602: ...Chapter 33 Introducing the SMT ZyWALL 5 35 70 Series User s Guide 602 ...
Page 622: ...Chapter 35 WAN and Dial Backup Setup ZyWALL 5 35 70 Series User s Guide 622 ...
Page 628: ...Chapter 36 LAN Setup ZyWALL 5 35 70 Series User s Guide 628 ...
Page 634: ...Chapter 37 Internet Access ZyWALL 5 35 70 Series User s Guide 634 ...
Page 638: ...Chapter 38 DMZ Setup ZyWALL 5 35 70 Series User s Guide 638 ...
Page 642: ...Chapter 39 Route Setup ZyWALL 5 35 70 Series User s Guide 642 ...
Page 658: ...Chapter 41 Remote Node Setup ZyWALL 5 35 70 Series User s Guide 658 ...
Page 662: ...Chapter 42 IP Static Route Setup ZyWALL 5 35 70 Series User s Guide 662 ...
Page 700: ...Chapter 45 Filter Configuration ZyWALL 5 35 70 Series User s Guide 700 ...
Page 738: ...Chapter 50 Remote Management ZyWALL 5 35 70 Series User s Guide 738 ...
Page 746: ...Chapter 51 IP Policy Routing ZyWALL 5 35 70 Series User s Guide 746 ...
Page 766: ...766 ...
Page 770: ...Appendix A Hardware Installation ZyWALL 5 35 70 Series User s Guide 770 ...
Page 780: ...Appendix C Removing and Installing a Fuse ZyWALL 5 35 70 Series User s Guide 780 ...
Page 802: ...Appendix D Setting up Your Computer s IP Address ZyWALL 5 35 70 Series User s Guide 802 ...
Page 816: ...Appendix F Common Services ZyWALL 5 35 70 Series User s Guide 816 ...
Page 852: ...Appendix J Importing Certificates ZyWALL 5 35 70 Series User s Guide 852 ...
Page 856: ...Appendix K Legal Information ZyWALL 5 35 70 Series User s Guide 856 ...
Page 862: ...Appendix L Customer Support ZyWALL 5 35 70 Series User s Guide 862 ...