List of Figures

Figure 125 DMZ Private and Public Address Example ........................................................................

209

 

Figure 126 NETWORK > DMZ > Port Roles .......................................................................................

210

 

Figure 127 Example of a Wireless Network ..........................................................................................

211

 

Figure 128 NETWORK > WLAN ..........................................................................................................

213

 

Figure 129 NETWORK > WLAN > Static DHCP .................................................................................

216

 

Figure 130 NETWORK > WLAN > IP Alias .........................................................................................

217

 

Figure 131 WLAN Port Role Example .................................................................................................

219

 

Figure 132 NETWORK > WLAN > Port Roles .....................................................................................

220

 

Figure 133 NETWORK > WLAN > Port Roles: Change Complete .......................................................

220

 

Figure 134 WIRELESS > Wi-Fi > Wireless Card ................................................................................

224

 

Figure 135 Configuring SSID ................................................................................................................

226

 

Figure 136 WIRELESS > Wi-Fi > Security ...........................................................................................

228

 

Figure 137 WIRELESS > Wi-Fi > Security: None .................................................................................

229

 

Figure 138 WIRELESS > Wi-Fi > Security: WEP .................................................................................

229

 

Figure 139 WIRELESS > Wi-Fi > Security: 802.1x Only .....................................................................

230

 

Figure 140 WIRELESS > Wi-Fi > Security: 802.1x + Static WEP ........................................................

231

 

Figure 141 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX ..............................................

232

 

Figure 142 WIRELESS > Wi-Fi > Security: WPA(2)-PSK .....................................................................

234

 

Figure 143 NETWORK > WIRELESS CARD > MAC Filter ..................................................................

235

 

Figure 144 Default Firewall Action ........................................................................................................

239

 

Figure 145 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................

240

 

Figure 146 Default Block Traffic From WAN1 to DMZ Example .......................................................

241

 

Figure 147 From LAN to VPN Example ...............................................................................................

243

 

Figure 148 Block DMZ to VPN Traffic by Default Example ...............................................................

244

 

Figure 149 From VPN to LAN Example ...............................................................................................

245

 

Figure 150 Block VPN to LAN Traffic by Default Example ...............................................................

246

 

Figure 151 From VPN to VPN Example ..............................................................................................

247

 

Figure 152 Block VPN to VPN Traffic by Default Example ...............................................................

247

 

Figure 153 Blocking All LAN to WAN IRC Traffic Example ..................................................................

248

 

Figure 154 Limited LAN to WAN IRC Traffic Example ..........................................................................

249

 

Figure 155 Using IP Alias to Solve the Triangle Route Problem ..........................................................

251

 

Figure 156 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................

251

 

Figure 157 SECURITY > FIREWALL > Default Rule (Bridge Mode) ....................................................

254

 

Figure 158 SECURITY > FIREWALL > Rule Summary .......................................................................

256

 

Figure 159 SECURITY > FIREWALL > Rule Summary > Edit ............................................................

258

 

Figure 160 SECURITY > FIREWALL > Anti-Probing ...........................................................................

260

 

Figure 161 Three-Way Handshake .......................................................................................................

261

 

Figure 162 SECURITY > FIREWALL > Threshold ............................................................................

262

 

Figure 163 SECURITY > FIREWALL > Service ...................................................................................

264

 

Figure 164 Firewall Edit Custom Service .............................................................................................

265

 

Figure 165 My Service Firewall Rule Example: Service ......................................................................

266

 

Figure 166 My Service Firewall Rule Example: Edit Custom Service .................................................

267

 

Figure 167 My Service Firewall Rule Example: Rule Summary ...........................................................

267

 

 

 

 

32

 

 

 

 

ZyWALL 2WG User’s Guide