ZyWALL 5/35/70 Series User’s Guide

Table 39 WAN: Ethernet Encapsulation .............................................................................

144

Table 40 WAN: PPPoE Encapsulation ...............................................................................

148

Table 41 WAN: PPTP Encapsulation .................................................................................

151

Table 42 Traffic Redirect ....................................................................................................

154

Table 43 Dial Backup .........................................................................................................

157

Table 44 Advanced Setup ..................................................................................................

160

Table 45 DMZ .....................................................................................................................

163

Table 46 DMZ Static DHCP ................................................................................................

166

Table 47 DMZ: IP Alias .......................................................................................................

167

Table 48 DMZ: Port Roles ..................................................................................................

172

Table 49 WLAN ..................................................................................................................

175

Table 50 WLAN Static DHCP .............................................................................................

178

Table 51 WLAN IP Alias .....................................................................................................

179

Table 52 WLAN Port Roles ................................................................................................

181

Table 53 Wireless Security Relational Matrix .....................................................................

184

Table 54 Wireless Card: No Security .................................................................................

191

Table 55 Wireless Card: Static WEP ..................................................................................

193

Table 56 Wireless Card: WPA-PSK ....................................................................................

194

Table 57 Wireless Card: WPA ............................................................................................

195

Table 58 Wireless Card: 802.1x + Dynamic WEP ..............................................................

196

Table 59 Wireless Card: 802.1x + Static WEP ...................................................................

197

Table 60 Wireless Card: 802.1x + No WEP .......................................................................

199

Table 61 Wireless Card: No Access 802.1x + Static WEP .................................................

200

Table 62 Wireless Card: MAC Address Filter .....................................................................

201

Table 63 Common IP Ports ................................................................................................

204

Table 64 ICMP Commands That Trigger Alerts ..................................................................

207

Table 65 Legal NetBIOS Commands .................................................................................

207

Table 66 Legal SMTP Commands .....................................................................................

208

Table 67 Default Rule (Router Mode) .................................................................................

219

Table 68 Default Rule (Bridge Mode) .................................................................................

221

Table 69 Rule Summary .....................................................................................................

222

Table 70 Firewall Edit Rule .................................................................................................

225

Table 71 Anti-Probing .........................................................................................................

226

Table 72 Firewall Threshold ...............................................................................................

229

Table 73 Firewall Service ...................................................................................................

231

Table 74 Firewall Edit Custom Service ...............................................................................

232

Table 75 Predefined Services ............................................................................................

233

Table 76 IDP: General Setup .............................................................................................

246

Table 77 Attack Types ........................................................................................................

247

Table 78 Intrusion Severity .................................................................................................

248

Table 79 Signature Actions ................................................................................................

249

Table 80 IDP Signatures: Group View ................................................................................

250

Table 81 Signatures Update ...............................................................................................

256

45

List of Tables