ZyXEL Communications ZyXEL ZyWALL 2WG User Manual

Page 42

Advertising
background image

List of Tables

ZyWALL 2WG User’s Guide

42

Table 39 NETWORK > WAN > WAN 1 (Ethernet Encapsulation) ....................................................... 144
Table 40 NETWORK > WAN > WAN 1 (PPPoE Encapsulation) ......................................................... 147
Table 41 NETWORK > WAN > WAN 1 (PPTP Encapsulation) ............................................................ 150
Table 42 2G, 2.5G, 2.75G and 3G of Wireless Technologies ............................................................... 153
Table 43 NETWORK > WAN > WAN 2 (3G WAN) .............................................................................. 154
Table 44 NETWORK > WAN > Traffic Redirect ................................................................................... 157
Table 45 NETWORK > WAN > Dial Backup ........................................................................................ 158
Table 46 NETWORK > WAN > Dial Backup > Edit .............................................................................. 162
Table 47 NETWORK > DMZ ................................................................................................................ 164
Table 48 NETWORK > DMZ > Static DHCP ........................................................................................ 167
Table 49 NETWORK > DMZ > IP Alias ............................................................................................... 168
Table 50 NETWORK > DMZ > Port Roles ........................................................................................... 172
Table 51 NETWORK > WLAN ............................................................................................................. 175
Table 52 NETWORK > WLAN > Static DHCP ..................................................................................... 178
Table 53 NETWORK > WLAN > IP Alias ............................................................................................. 179
Table 54 NETWORK > WLAN > Port Roles ........................................................................................ 182
Table 55 Types of Encryption for Each Type of Authentication ........................................................... 184
Table 56 NETWORK > WIRELESS CARD .......................................................................................... 186
Table 57 Configuring SSID .................................................................................................................. 188
Table 58 Security Modes ..................................................................................................................... 189
Table 59 NETWORK > WIRELESS CARD > Security ......................................................................... 189
Table 60 NETWORK > WIRELESS CARD > Security: None .............................................................. 190
Table 61 NETWORK > WIRELESS CARD > Security: WEP .............................................................. 191
Table 62 NETWORK > WIRELESS CARD > Security: 802.1x Only ................................................... 192
Table 63 NETWORK > WIRELESS CARD > Security: 802.1x + Static WEP ...................................... 193
Table 64 NETWORK > WIRELESS CARD > Security: WPA, WPA2 or WPA2-MIX ............................ 194
Table 65 NETWORK > WIRELESS CARD > Security: WPA(2)-PSK .................................................. 195
Table 66 NETWORK > WIRELESS CARD > MAC Filter ..................................................................... 197
Table 67 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 210
Table 68 Limited LAN to WAN IRC Traffic Example ............................................................................ 210
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 213
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 215
Table 71 SECURITY > FIREWALL > Rule Summary .......................................................................... 216
Table 72 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 219
Table 73 SECURITY > FIREWALL > Anti-Probing .............................................................................. 221
Table 74 SECURITY > FIREWALL > Threshold .................................................................................. 223
Table 75 SECURITY > FIREWALL > Service ...................................................................................... 224
Table 76 SECURITY > FIREWALL > Service > Add ........................................................................... 226
Table 77 SECURITY > CONTENT FILTER > General ........................................................................ 232
Table 78 SECURITY > CONTENT FILTER > Categories .................................................................... 236
Table 79 SECURITY > CONTENT FILTER > Customization .............................................................. 244
Table 80 SECURITY > CONTENT FILTER > Cache ........................................................................... 247
Table 81 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 260

Advertising