ZyWALL 5/35/70 Series User’s Guide

Table 39 WAN: Ethernet Encapsulation .............................................................................

140

Table 40 WAN: PPPoE Encapsulation ...............................................................................

144

Table 41 WAN: PPTP Encapsulation .................................................................................

147

Table 42 Traffic Redirect ....................................................................................................

150

Table 43 Dial Backup .........................................................................................................

153

Table 44 Advanced Setup ..................................................................................................

156

Table 45 DMZ .....................................................................................................................

159

Table 46 DMZ Static DHCP ................................................................................................

162

Table 47 DMZ: IP Alias .......................................................................................................

163

Table 48 DMZ: Port Roles ..................................................................................................

168

Table 49 WLAN ..................................................................................................................

171

Table 50 WLAN Static DHCP .............................................................................................

174

Table 51 WLAN IP Alias .....................................................................................................

175

Table 52 WLAN Port Roles ................................................................................................

177

Table 53 Wireless Security Relational Matrix .....................................................................

180

Table 54 Wireless Card: No Security .................................................................................

187

Table 55 Wireless Card: Static WEP ..................................................................................

189

Table 56 Wireless Card: WPA-PSK ....................................................................................

190

Table 57 Wireless Card: WPA ............................................................................................

191

Table 58 Wireless Card: 802.1x + Dynamic WEP ..............................................................

192

Table 59 Wireless Card: 802.1x + Static WEP ...................................................................

193

Table 60 Wireless Card: 802.1x + No WEP .......................................................................

195

Table 61 Wireless Card: No Access 802.1x + Static WEP .................................................

196

Table 62 Wireless Card: MAC Address Filter .....................................................................

197

Table 63 Common IP Ports ................................................................................................

200

Table 64 ICMP Commands That Trigger Alerts ..................................................................

203

Table 65 Legal NetBIOS Commands .................................................................................

203

Table 66 Legal SMTP Commands .....................................................................................

204

Table 67 Default Rule (Router Mode) .................................................................................

215

Table 68 Default Rule (Bridge Mode) .................................................................................

217

Table 69 Rule Summary .....................................................................................................

218

Table 70 Firewall Edit Rule .................................................................................................

221

Table 71 Anti-Probing .........................................................................................................

222

Table 72 Firewall Threshold ...............................................................................................

225

Table 73 Firewall Service ...................................................................................................

227

Table 74 Firewall Edit Custom Service ...............................................................................

228

Table 75 Predefined Services ............................................................................................

229

Table 76 IDP: General Setup .............................................................................................

242

Table 77 Attack Types ........................................................................................................

243

Table 78 Intrusion Severity .................................................................................................

244

Table 79 Signature Actions ................................................................................................

245

Table 80 IDP Signatures: Group View ................................................................................

246

Table 81 Signatures Update ...............................................................................................

252

41

List of Tables