ZyWALL 5/35/70 Series User’s Guide
Table 39 WAN: Ethernet Encapsulation .............................................................................
144
Table 40 WAN: PPPoE Encapsulation ...............................................................................
148
Table 41 WAN: PPTP Encapsulation .................................................................................
151
Table 42 Traffic Redirect ....................................................................................................
154
Table 43 Dial Backup .........................................................................................................
157
Table 44 Advanced Setup ..................................................................................................
160
Table 45 DMZ .....................................................................................................................
163
Table 46 DMZ Static DHCP ................................................................................................
166
Table 47 DMZ: IP Alias .......................................................................................................
167
Table 48 DMZ: Port Roles ..................................................................................................
172
Table 49 WLAN ..................................................................................................................
175
Table 50 WLAN Static DHCP .............................................................................................
178
Table 51 WLAN IP Alias .....................................................................................................
179
Table 52 WLAN Port Roles ................................................................................................
181
Table 53 Wireless Security Relational Matrix .....................................................................
184
Table 54 Wireless Card: No Security .................................................................................
191
Table 55 Wireless Card: Static WEP ..................................................................................
193
Table 56 Wireless Card: WPA-PSK ....................................................................................
194
Table 57 Wireless Card: WPA ............................................................................................
195
Table 58 Wireless Card: 802.1x + Dynamic WEP ..............................................................
196
Table 59 Wireless Card: 802.1x + Static WEP ...................................................................
197
Table 60 Wireless Card: 802.1x + No WEP .......................................................................
199
Table 61 Wireless Card: No Access 802.1x + Static WEP .................................................
200
Table 62 Wireless Card: MAC Address Filter .....................................................................
201
Table 63 Common IP Ports ................................................................................................
204
Table 64 ICMP Commands That Trigger Alerts ..................................................................
207
Table 65 Legal NetBIOS Commands .................................................................................
Table 66 Legal SMTP Commands .....................................................................................
208
Table 67 Default Rule (Router Mode) .................................................................................
219
Table 68 Default Rule (Bridge Mode) .................................................................................
221
Table 69 Rule Summary .....................................................................................................
222
Table 70 Firewall Edit Rule .................................................................................................
225
Table 71 Anti-Probing .........................................................................................................
226
Table 72 Firewall Threshold ...............................................................................................
229
Table 73 Firewall Service ...................................................................................................
231
Table 74 Firewall Edit Custom Service ...............................................................................
232
Table 75 Predefined Services ............................................................................................
233
Table 76 IDP: General Setup .............................................................................................
246
Table 77 Attack Types ........................................................................................................
247
Table 78 Intrusion Severity .................................................................................................
248
Table 79 Signature Actions ................................................................................................
249
Table 80 IDP Signatures: Group View ................................................................................
250
Table 81 Signatures Update ...............................................................................................
256
45
List of Tables