ZyWALL 5/35/70 Series User’s Guide
Table 39 WAN: Ethernet Encapsulation .............................................................................
140
Table 40 WAN: PPPoE Encapsulation ...............................................................................
144
Table 41 WAN: PPTP Encapsulation .................................................................................
147
Table 42 Traffic Redirect ....................................................................................................
150
Table 43 Dial Backup .........................................................................................................
153
Table 44 Advanced Setup ..................................................................................................
156
Table 45 DMZ .....................................................................................................................
159
Table 46 DMZ Static DHCP ................................................................................................
162
Table 47 DMZ: IP Alias .......................................................................................................
163
Table 48 DMZ: Port Roles ..................................................................................................
168
Table 49 WLAN ..................................................................................................................
171
Table 50 WLAN Static DHCP .............................................................................................
174
Table 51 WLAN IP Alias .....................................................................................................
175
Table 52 WLAN Port Roles ................................................................................................
177
Table 53 Wireless Security Relational Matrix .....................................................................
180
Table 54 Wireless Card: No Security .................................................................................
187
Table 55 Wireless Card: Static WEP ..................................................................................
189
Table 56 Wireless Card: WPA-PSK ....................................................................................
190
Table 57 Wireless Card: WPA ............................................................................................
191
Table 58 Wireless Card: 802.1x + Dynamic WEP ..............................................................
192
Table 59 Wireless Card: 802.1x + Static WEP ...................................................................
193
Table 60 Wireless Card: 802.1x + No WEP .......................................................................
195
Table 61 Wireless Card: No Access 802.1x + Static WEP .................................................
196
Table 62 Wireless Card: MAC Address Filter .....................................................................
197
Table 63 Common IP Ports ................................................................................................
200
Table 64 ICMP Commands That Trigger Alerts ..................................................................
203
Table 65 Legal NetBIOS Commands .................................................................................
Table 66 Legal SMTP Commands .....................................................................................
204
Table 67 Default Rule (Router Mode) .................................................................................
215
Table 68 Default Rule (Bridge Mode) .................................................................................
217
Table 69 Rule Summary .....................................................................................................
218
Table 70 Firewall Edit Rule .................................................................................................
221
Table 71 Anti-Probing .........................................................................................................
222
Table 72 Firewall Threshold ...............................................................................................
225
Table 73 Firewall Service ...................................................................................................
227
Table 74 Firewall Edit Custom Service ...............................................................................
228
Table 75 Predefined Services ............................................................................................
229
Table 76 IDP: General Setup .............................................................................................
242
Table 77 Attack Types ........................................................................................................
243
Table 78 Intrusion Severity .................................................................................................
244
Table 79 Signature Actions ................................................................................................
245
Table 80 IDP Signatures: Group View ................................................................................
246
Table 81 Signatures Update ...............................................................................................
252
41
List of Tables