List of Tables

Table 39 NETWORK > WAN > WAN 1 (PPPoE Encapsulation) .........................................................

182

 

Table 40 NETWORK > WAN > WAN 1 (PPTP Encapsulation) ............................................................

185

 

Table 41 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies .........................................................

188

 

Table 42 NETWORK > WAN > WAN 2 (3G WAN) ..............................................................................

190

 

Table 43 NETWORK > WAN > Traffic Redirect ...................................................................................

194

 

Table 44 NETWORK > WAN > Dial Backup ........................................................................................

195

 

Table 45 NETWORK > WAN > Dial Backup > Edit ..............................................................................

199

 

Table 46 NETWORK > DMZ ................................................................................................................

202

 

Table 47 NETWORK > DMZ > Static DHCP ........................................................................................

205

 

Table 48 NETWORK > DMZ > IP Alias ...............................................................................................

206

 

Table 49 NETWORK > DMZ > Port Roles ...........................................................................................

210

 

Table 50 NETWORK > WLAN .............................................................................................................

213

 

Table 51 NETWORK > WLAN > Static DHCP .....................................................................................

216

 

Table 52 NETWORK > WLAN > IP Alias .............................................................................................

217

 

Table 53 NETWORK > WLAN > Port Roles ........................................................................................

220

 

Table 54 Types of Encryption for Each Type of Authentication ...........................................................

222

 

Table 55 WIRELESS > Wi-Fi > Wireless Card ....................................................................................

224

 

Table 56 Configuring SSID ..................................................................................................................

227

 

Table 57 Security Modes .....................................................................................................................

227

 

Table 58 WIRELESS > Wi-Fi > Security ..............................................................................................

228

 

Table 59 WIRELESS > Wi-Fi > Security: None ...................................................................................

229

 

Table 60 WIRELESS > Wi-Fi > Security: WEP ....................................................................................

230

 

Table 61 WIRELESS > Wi-Fi > Security: 802.1x Only .........................................................................

230

 

Table 62 WIRELESS > Wi-Fi > Security: 802.1x + Static WEP ...........................................................

231

 

Table 63 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX .................................................

233

 

Table 64 WIRELESS > Wi-Fi > Security: WPA(2)-PSK .......................................................................

234

 

Table 65 WIRELESS > Wi-Fi > MAC Filter ..........................................................................................

235

 

Table 66 Blocking All LAN to WAN IRC Traffic Example .....................................................................

249

 

Table 67 Limited LAN to WAN IRC Traffic Example ............................................................................

249

 

Table 68 SECURITY > FIREWALL > Default Rule (Router Mode) ......................................................

252

 

Table 69 SECURITY > FIREWALL > Default Rule (Bridge Mode) ......................................................

254

 

Table 70 SECURITY > FIREWALL > Rule Summary ..........................................................................

256

 

Table 71 SECURITY > FIREWALL > Rule Summary > Edit ................................................................

259

 

Table 72 SECURITY > FIREWALL > Anti-Probing ..............................................................................

261

 

Table 73 SECURITY > FIREWALL > Threshold ..................................................................................

263

 

Table 74 SECURITY > FIREWALL > Service ......................................................................................

264

 

Table 75 SECURITY > FIREWALL > Service > Add ...........................................................................

266

 

Table 76 SECURITY > CONTENT FILTER > General ........................................................................

273

 

Table 77 SECURITY > CONTENT FILTER > Policy ...........................................................................

276

 

Table 78 SECURITY > CONTENT FILTER > Policy > General ...........................................................

277

 

Table 79 SECURITY > CONTENT FILTER > Policy > External Database ..........................................

279

 

Table 80 SECURITY > CONTENT FILTER > Policy > Customization .................................................

286

 

Table 81 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................

288

 

 

 

 

44

 

 

 

 

ZyWALL 2WG User’s Guide