ZyWALL 5/35/70 Series User’s Guide

Figure 82 Wireless Card: WPA-PSK ...................................................................................

190

Figure 83 Wireless Card: WPA ...........................................................................................

191

Figure 84 Wireless Card: 802.1x + Dynamic WEP .............................................................

192

Figure 85 Wireless Card: 802.1x + Static WEP ...................................................................

193

Figure 86 Wireless Card: 802.1x + No WEP .......................................................................

194

Figure 87 Wireless Card: No Access 802.1x + Static WEP ................................................

195

Figure 88 Wireless Card: MAC Address Filter ....................................................................

197

Figure 89 ZyWALL Firewall Application ..............................................................................

200

Figure 90 Three-Way Handshake .......................................................................................

201

Figure 91 SYN Flood ...........................................................................................................

202

Figure 92 Smurf Attack .......................................................................................................

203

Figure 93 Stateful Inspection ...............................................................................................

205

Figure 94 LAN to WAN Traffic .............................................................................................

214

Figure 95 WAN to LAN Traffic .............................................................................................

214

Figure 96 Default Rule (Router Mode) ................................................................................

215

Figure 97 Default Rule (Bridge Mode) ................................................................................

217

Figure 98 Rule Summary ....................................................................................................

218

Figure 99 Firewall Edit Rule ................................................................................................

220

Figure 100 Anti-Probing ......................................................................................................

222

Figure 101 Firewall Threshold .............................................................................................

225

Figure 102 Firewall Service .................................................................................................

227

Figure 103 Firewall Edit Custom Service ............................................................................

228

Figure 104 Service ..............................................................................................................

232

Figure 105 Edit Custom Service Example ..........................................................................

232

Figure 106 Rule Summary ..................................................................................................

233

Figure 107 Rule Edit Example ............................................................................................

233

Figure 108 My Service Rule Configuration .........................................................................

234

Figure 109 My Service Example Rule Summary ................................................................

235

Figure 110 Network Intrusions ...........................................................................................

236

Figure 111 Applying IDP to Interfaces .................................................................................

241

Figure 112 IDP: General .....................................................................................................

242

Figure 113 Attack Types ......................................................................................................

243

Figure 114 Signature Actions ..............................................................................................

245

Figure 115 IDP: Signatures .................................................................................................

246

Figure 116 Signature Query by Partial Name .....................................................................

248

Figure 117 Signature Query by Complete ID ......................................................................

249

Figure 118 Signature Query by Attribute. ............................................................................

250

Figure 119 Signatures Update ............................................................................................

251

Figure 120 IDP: Backup & Restore .....................................................................................

253

Figure 121 ZyWALL Anti-virus Example ..........................................................................

256

Figure 122 Anti-Virus: General ...........................................................................................

257

Figure 123 Anti-Virus: Update .............................................................................................

260

Figure 124 Anti-spam External Database Example ............................................................

264

List of Figures

30