List of Figures
Figure 125 DMZ Private and Public Address Example ........................................................................
209
Figure 126 NETWORK > DMZ > Port Roles .......................................................................................
210
Figure 127 Example of a Wireless Network ..........................................................................................
211
Figure 128 NETWORK > WLAN ..........................................................................................................
213
Figure 129 NETWORK > WLAN > Static DHCP .................................................................................
216
Figure 130 NETWORK > WLAN > IP Alias .........................................................................................
217
Figure 131 WLAN Port Role Example .................................................................................................
219
Figure 132 NETWORK > WLAN > Port Roles .....................................................................................
220
Figure 133 NETWORK > WLAN > Port Roles: Change Complete .......................................................
Figure 134 WIRELESS > Wi-Fi > Wireless Card ................................................................................
224
Figure 135 Configuring SSID ................................................................................................................
226
Figure 136 WIRELESS > Wi-Fi > Security ...........................................................................................
228
Figure 137 WIRELESS > Wi-Fi > Security: None .................................................................................
229
Figure 138 WIRELESS > Wi-Fi > Security: WEP .................................................................................
Figure 139 WIRELESS > Wi-Fi > Security: 802.1x Only .....................................................................
230
Figure 140 WIRELESS > Wi-Fi > Security: 802.1x + Static WEP ........................................................
231
Figure 141 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX ..............................................
232
Figure 142 WIRELESS > Wi-Fi > Security: WPA(2)-PSK .....................................................................
234
Figure 143 NETWORK > WIRELESS CARD > MAC Filter ..................................................................
235
Figure 144 Default Firewall Action ........................................................................................................
239
Figure 145 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................
240
Figure 146 Default Block Traffic From WAN1 to DMZ Example .......................................................
241
Figure 147 From LAN to VPN Example ...............................................................................................
243
Figure 148 Block DMZ to VPN Traffic by Default Example ...............................................................
244
Figure 149 From VPN to LAN Example ...............................................................................................
245
Figure 150 Block VPN to LAN Traffic by Default Example ...............................................................
246
Figure 151 From VPN to VPN Example ..............................................................................................
247
Figure 152 Block VPN to VPN Traffic by Default Example ...............................................................
Figure 153 Blocking All LAN to WAN IRC Traffic Example ..................................................................
248
Figure 154 Limited LAN to WAN IRC Traffic Example ..........................................................................
249
Figure 155 Using IP Alias to Solve the Triangle Route Problem ..........................................................
251
Figure 156 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................
Figure 157 SECURITY > FIREWALL > Default Rule (Bridge Mode) ....................................................
254
Figure 158 SECURITY > FIREWALL > Rule Summary .......................................................................
256
Figure 159 SECURITY > FIREWALL > Rule Summary > Edit ............................................................
258
Figure 160 SECURITY > FIREWALL > Anti-Probing ...........................................................................
260
Figure 161 Three-Way Handshake .......................................................................................................
261
Figure 162 SECURITY > FIREWALL > Threshold ............................................................................
262
Figure 163 SECURITY > FIREWALL > Service ...................................................................................
264
Figure 164 Firewall Edit Custom Service .............................................................................................
265
Figure 165 My Service Firewall Rule Example: Service ......................................................................
266
Figure 166 My Service Firewall Rule Example: Edit Custom Service .................................................
267
Figure 167 My Service Firewall Rule Example: Rule Summary ...........................................................
32
ZyWALL 2WG User’s Guide