List of Tables
ZyWALL 5/35/70 Series User’s Guide
42
Table 39 Load Balancing: Weighted Round Robin
..............................................................................
180
Table 40 Load Balancing: Spillover
......................................................................................................
181
Table 41 Private IP Address Ranges
...................................................................................................
182
Table 42 NETWORK > WAN > WAN (Ethernet Encapsulation)
..........................................................
184
Table 43 NETWORK > WAN > WAN (PPPoE Encapsulation)
............................................................
187
Table 44 NETWORK > WAN > WAN (PPTP Encapsulation)
...............................................................
190
Table 45 NETWORK > WAN > 3G (WAN 2)
........................................................................................
194
Table 46 NETWORK > WAN > Traffic Redirect
...................................................................................
198
Table 47 NETWORK > WAN > Dial Backup
........................................................................................
200
Table 48 NETWORK > WAN > Dial Backup > Edit
..............................................................................
203
Table 49 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies
.........................................................
204
Table 50 NETWORK > DMZ
.................................................................................................................
211
Table 51 NETWORK > DMZ > Static DHCP
........................................................................................
214
Table 52 NETWORK > DMZ > IP Alias
...............................................................................................
215
Table 53 NETWORK > DMZ > Port Roles
...........................................................................................
216
Table 54 NETWORK > WLAN
.............................................................................................................
221
Table 55 NETWORK > WLAN > Static DHCP
.....................................................................................
224
Table 56 NETWORK > WLAN > IP Alias
.............................................................................................
225
Table 57 NETWORK > WLAN > Port Roles
........................................................................................
227
Table 58 WIRELESS > Wi-Fi > Wireless Card: No Security
................................................................
233
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP
................................................................
235
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK
..................................................................
236
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA
..........................................................................
237
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP
............................................
238
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP
.................................................
239
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP
......................................................
241
Table 65 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP
...............................
242
Table 66 WIRELESS > Wi-Fi > MAC Filter
..........................................................................................
243
Table 67 Blocking All LAN to WAN IRC Traffic Example
.....................................................................
253
Table 68 Limited LAN to WAN IRC Traffic Example
............................................................................
254
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode)
......................................................
255
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode)
......................................................
257
Table 71 SECURITY > FIREWALL > Rule Summary
..........................................................................
259
Table 72 SECURITY > FIREWALL > Rule Summary > Edit
................................................................
262
Table 73 SECURITY > FIREWALL > Anti-Probing
..............................................................................
264
Table 74 SECURITY > FIREWALL > Threshold
..................................................................................
265
Table 75 SECURITY > FIREWALL > Service
......................................................................................
266
Table 76 SECURITY > FIREWALL > Service > Add
...........................................................................
267
Table 77 SECURITY > IDP > General Setup
......................................................................................
280
Table 78 SECURITY > IDP > Signature: Attack Types
........................................................................
281
Table 79 SECURITY > IDP > Signature: Intrusion Severity
................................................................
282
Table 80 SECURITY > IDP > Signature: Actions
................................................................................
282
Table 81 SECURITY > IDP > Signature: Group View
.........................................................................
283