List of Tables
Table 39 NETWORK > WAN > WAN 1 (PPPoE Encapsulation) .........................................................
182
Table 40 NETWORK > WAN > WAN 1 (PPTP Encapsulation) ............................................................
185
Table 41 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies .........................................................
188
Table 42 NETWORK > WAN > WAN 2 (3G WAN) ..............................................................................
190
Table 43 NETWORK > WAN > Traffic Redirect ...................................................................................
194
Table 44 NETWORK > WAN > Dial Backup ........................................................................................
195
Table 45 NETWORK > WAN > Dial Backup > Edit ..............................................................................
199
Table 46 NETWORK > DMZ ................................................................................................................
202
Table 47 NETWORK > DMZ > Static DHCP ........................................................................................
205
Table 48 NETWORK > DMZ > IP Alias ...............................................................................................
206
Table 49 NETWORK > DMZ > Port Roles ...........................................................................................
210
Table 50 NETWORK > WLAN .............................................................................................................
213
Table 51 NETWORK > WLAN > Static DHCP .....................................................................................
216
Table 52 NETWORK > WLAN > IP Alias .............................................................................................
217
Table 53 NETWORK > WLAN > Port Roles ........................................................................................
220
Table 54 Types of Encryption for Each Type of Authentication ...........................................................
222
Table 55 WIRELESS > Wi-Fi > Wireless Card ....................................................................................
224
Table 56 Configuring SSID ..................................................................................................................
227
Table 57 Security Modes .....................................................................................................................
Table 58 WIRELESS > Wi-Fi > Security ..............................................................................................
228
Table 59 WIRELESS > Wi-Fi > Security: None ...................................................................................
229
Table 60 WIRELESS > Wi-Fi > Security: WEP ....................................................................................
230
Table 61 WIRELESS > Wi-Fi > Security: 802.1x Only .........................................................................
Table 62 WIRELESS > Wi-Fi > Security: 802.1x + Static WEP ...........................................................
231
Table 63 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX .................................................
233
Table 64 WIRELESS > Wi-Fi > Security: WPA(2)-PSK .......................................................................
234
Table 65 WIRELESS > Wi-Fi > MAC Filter ..........................................................................................
235
Table 66 Blocking All LAN to WAN IRC Traffic Example .....................................................................
249
Table 67 Limited LAN to WAN IRC Traffic Example ............................................................................
Table 68 SECURITY > FIREWALL > Default Rule (Router Mode) ......................................................
252
Table 69 SECURITY > FIREWALL > Default Rule (Bridge Mode) ......................................................
254
Table 70 SECURITY > FIREWALL > Rule Summary ..........................................................................
256
Table 71 SECURITY > FIREWALL > Rule Summary > Edit ................................................................
259
Table 72 SECURITY > FIREWALL > Anti-Probing ..............................................................................
261
Table 73 SECURITY > FIREWALL > Threshold ..................................................................................
263
Table 74 SECURITY > FIREWALL > Service ......................................................................................
264
Table 75 SECURITY > FIREWALL > Service > Add ...........................................................................
266
Table 76 SECURITY > CONTENT FILTER > General ........................................................................
273
Table 77 SECURITY > CONTENT FILTER > Policy ...........................................................................
276
Table 78 SECURITY > CONTENT FILTER > Policy > General ...........................................................
277
Table 79 SECURITY > CONTENT FILTER > Policy > External Database ..........................................
279
Table 80 SECURITY > CONTENT FILTER > Policy > Customization .................................................
286
Table 81 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................
288
44
ZyWALL 2WG User’s Guide