ZyXEL Communications ZyXEL ZyWALL 2WG User Manual

Page 31

Advertising
background image

List of Figures

ZyWALL 2WG User’s Guide

31

Figure 82 Example of a Wireless Network ........................................................................................... 173
Figure 83 NETWORK > WLAN ............................................................................................................ 175
Figure 84 NETWORK > WLAN > Static DHCP ................................................................................... 178
Figure 85 NETWORK > WLAN > IP Alias ........................................................................................... 179
Figure 86 WLAN Port Role Example ................................................................................................... 181
Figure 87 NETWORK > WLAN > Port Roles ....................................................................................... 181
Figure 88 NETWORK > WLAN > Port Roles: Change Complete ......................................................... 182
Figure 89 NETWORK > WIRELESS CARD ......................................................................................... 185
Figure 90 Configuring SSID .................................................................................................................. 188
Figure 91 NETWORK > WIRELESS CARD > Security ........................................................................ 189
Figure 92 NETWORK > WIRELESS CARD > Security: None ............................................................. 190
Figure 93 NETWORK > WIRELESS CARD > Security: WEP .............................................................. 191
Figure 94 NETWORK > WIRELESS CARD > Security: 802.1x Only .................................................. 192
Figure 95 NETWORK > WIRELESS CARD > Security: 802.1x + Static WEP ..................................... 193
Figure 96 NETWORK > WIRELESS CARD > Security: WPA, WPA2 or WPA2-MIX .......................... 194
Figure 97 NETWORK > WIRELESS CARD > Security: WPA(2)-PSK ................................................. 195
Figure 98 NETWORK > WIRELESS CARD > MAC Filter .................................................................... 196
Figure 99 Default Firewall Action .......................................................................................................... 201
Figure 100 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 202
Figure 101 Default Block Traffic From WAN1 to DMZ Example ....................................................... 203
Figure 102 From LAN to VPN Example ............................................................................................... 205
Figure 103 Block DMZ to VPN Traffic by Default Example ............................................................... 205
Figure 104 From VPN to LAN Example ............................................................................................... 206
Figure 105 Block VPN to LAN Traffic by Default Example ............................................................... 207
Figure 106 From VPN to VPN Example .............................................................................................. 208
Figure 107 Block VPN to VPN Traffic by Default Example ............................................................... 208
Figure 108 Blocking All LAN to WAN IRC Traffic Example .................................................................. 209
Figure 109 Limited LAN to WAN IRC Traffic Example .......................................................................... 210
Figure 110 Using IP Alias to Solve the Triangle Route Problem .......................................................... 212
Figure 111 SECURITY > FIREWALL > Default Rule (Router Mode) .................................................... 212
Figure 112 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 214
Figure 113 SECURITY > FIREWALL > Rule Summary ........................................................................ 216
Figure 114 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 218
Figure 115 SECURITY > FIREWALL > Anti-Probing ............................................................................ 220
Figure 116 Three-Way Handshake ....................................................................................................... 221
Figure 117 SECURITY > FIREWALL > Threshold ............................................................................ 222
Figure 118 SECURITY > FIREWALL > Service ................................................................................... 224
Figure 119 Firewall Edit Custom Service .............................................................................................. 225
Figure 120 My Service Firewall Rule Example: Service ...................................................................... 226
Figure 121 My Service Firewall Rule Example: Edit Custom Service ................................................. 227
Figure 122 My Service Firewall Rule Example: Rule Summary ........................................................... 227
Figure 123 My Service Firewall Rule Example: Rule Edit ................................................................... 228
Figure 124 My Service Firewall Rule Example: Rule Configuration ..................................................... 229

Advertising