List of Figures
ZyWALL 5/35/70 Series User’s Guide
32
Figure 125 WLAN Port Role Example
.................................................................................................
226
Figure 126 NETWORK > WLAN > Port Roles
.....................................................................................
227
Figure 127 NETWORK > WLAN > Port Roles: Change Complete
.......................................................
227
Figure 128 WLAN Overview
.................................................................................................................
229
Figure 129 ZyWALL Wireless Security Levels
......................................................................................
230
Figure 130 WIRELESS > Wi-Fi > Wireless Card: No Security
.............................................................
232
Figure 131 WIRELESS > Wi-Fi > Wireless Card: Static WEP
..............................................................
235
Figure 132 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK
...............................................................
236
Figure 133 WIRELESS > Wi-Fi > Wireless Card: WPA
........................................................................
237
Figure 134 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP
..........................................
238
Figure 135 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP
...............................................
239
Figure 136 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP
...................................................
241
Figure 137 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP
.............................
242
Figure 138 WIRELESS > Wi-Fi > MAC Filter
.......................................................................................
243
Figure 139 EAP Authentication
............................................................................................................
245
Figure 140 WPA-PSK Authentication
...................................................................................................
246
Figure 141 WPA with RADIUS Application Example
............................................................................
247
Figure 142 Default Firewall Action
........................................................................................................
251
Figure 143 Blocking All LAN to WAN IRC Traffic Example
..................................................................
253
Figure 144 Limited LAN to WAN IRC Traffic Example
..........................................................................
254
Figure 145 SECURITY > FIREWALL > Default Rule (Router Mode)
...................................................
255
Figure 146 SECURITY > FIREWALL > Default Rule (Bridge Mode)
....................................................
257
Figure 147 SECURITY > FIREWALL > Rule Summary
.......................................................................
259
Figure 148 SECURITY > FIREWALL > Rule Summary > Edit
............................................................
261
Figure 149 SECURITY > FIREWALL > Anti-Probing
...........................................................................
263
Figure 150 SECURITY > FIREWALL > Threshold
............................................................................
264
Figure 151 SECURITY > FIREWALL > Service
...................................................................................
266
Figure 152 SECURITY > FIREWALL > Service > Add
.........................................................................
267
Figure 153 My Service Firewall Rule Example: Service
......................................................................
268
Figure 154 My Service Firewall Rule Example: Edit Custom Service
.................................................
268
Figure 155 My Service Firewall Rule Example: Rule Summary
...........................................................
269
Figure 156 My Service Firewall Rule Example: Rule Edit
...................................................................
269
Figure 157 My Service Firewall Rule Example: Rule Configuration
.....................................................
270
Figure 158 My Service Firewall Rule Example: Rule Summary
...........................................................
271
Figure 159 From LAN to VPN Example
...............................................................................................
273
Figure 160 From VPN to LAN Example
...............................................................................................
273
Figure 161 From VPN to VPN Example
..............................................................................................
274
Figure 162 Using IP Alias to Solve the Triangle Route Problem
..........................................................
275
Figure 163 Three-Way Handshake
.......................................................................................................
275
Figure 164 Network Intrusions
.............................................................................................................
277
Figure 165 Applying IDP to Interfaces
..................................................................................................
278
Figure 166 SECURITY > IDP > General
..............................................................................................
279
Figure 167 SECURITY > IDP > Signature: Group View
.......................................................................
283