ZyWALL 5/35/70 Series User’s Guide
Figure 82 Wireless Card: WPA-PSK ...................................................................................
190
Figure 83 Wireless Card: WPA ...........................................................................................
191
Figure 84 Wireless Card: 802.1x + Dynamic WEP .............................................................
192
Figure 85 Wireless Card: 802.1x + Static WEP ...................................................................
193
Figure 86 Wireless Card: 802.1x + No WEP .......................................................................
194
Figure 87 Wireless Card: No Access 802.1x + Static WEP ................................................
195
Figure 88 Wireless Card: MAC Address Filter ....................................................................
197
Figure 89 ZyWALL Firewall Application ..............................................................................
200
Figure 90 Three-Way Handshake .......................................................................................
201
Figure 91 SYN Flood ...........................................................................................................
202
Figure 92 Smurf Attack .......................................................................................................
203
Figure 93 Stateful Inspection ...............................................................................................
205
Figure 94 LAN to WAN Traffic .............................................................................................
214
Figure 95 WAN to LAN Traffic .............................................................................................
Figure 96 Default Rule (Router Mode) ................................................................................
215
Figure 97 Default Rule (Bridge Mode) ................................................................................
217
Figure 98 Rule Summary ....................................................................................................
218
Figure 99 Firewall Edit Rule ................................................................................................
220
Figure 100 Anti-Probing ......................................................................................................
222
Figure 101 Firewall Threshold .............................................................................................
225
Figure 102 Firewall Service .................................................................................................
227
Figure 103 Firewall Edit Custom Service ............................................................................
228
Figure 104 Service ..............................................................................................................
232
Figure 105 Edit Custom Service Example ..........................................................................
Figure 106 Rule Summary ..................................................................................................
233
Figure 107 Rule Edit Example ............................................................................................
Figure 108 My Service Rule Configuration .........................................................................
234
Figure 109 My Service Example Rule Summary ................................................................
235
Figure 110 Network Intrusions ...........................................................................................
236
Figure 111 Applying IDP to Interfaces .................................................................................
241
Figure 112 IDP: General .....................................................................................................
242
Figure 113 Attack Types ......................................................................................................
243
Figure 114 Signature Actions ..............................................................................................
245
Figure 115 IDP: Signatures .................................................................................................
246
Figure 116 Signature Query by Partial Name .....................................................................
248
Figure 117 Signature Query by Complete ID ......................................................................
249
Figure 118 Signature Query by Attribute. ............................................................................
250
Figure 119 Signatures Update ............................................................................................
251
Figure 120 IDP: Backup & Restore .....................................................................................
253
Figure 121 ZyWALL Anti-virus Example ..........................................................................
256
Figure 122 Anti-Virus: General ...........................................................................................
257
Figure 123 Anti-Virus: Update .............................................................................................
260
Figure 124 Anti-spam External Database Example ............................................................
264
List of Figures
30