ZyXEL Communications 2WG Network Card User Manual


 
List of Figures
ZyWALL 2WG User’s Guide
32
Figure 125 DMZ Private and Public Address Example ........................................................................ 209
Figure 126 NETWORK > DMZ > Port Roles ....................................................................................... 210
Figure 127 Example of a Wireless Network ..........................................................................................211
Figure 128 NETWORK > WLAN .......................................................................................................... 213
Figure 129 NETWORK > WLAN > Static DHCP ................................................................................. 216
Figure 130 NETWORK > WLAN > IP Alias ......................................................................................... 217
Figure 131 WLAN Port Role Example ................................................................................................. 219
Figure 132 NETWORK > WLAN > Port Roles ..................................................................................... 220
Figure 133 NETWORK > WLAN > Port Roles: Change Complete ....................................................... 220
Figure 134 WIRELESS > Wi-Fi > Wireless Card ................................................................................ 224
Figure 135 Configuring SSID ................................................................................................................ 226
Figure 136 WIRELESS > Wi-Fi > Security ........................................................................................... 228
Figure 137 WIRELESS > Wi-Fi > Security: None ................................................................................. 229
Figure 138 WIRELESS > Wi-Fi > Security: WEP ................................................................................. 229
Figure 139 WIRELESS > Wi-Fi > Security: 802.1x Only ..................................................................... 230
Figure 140 WIRELESS > Wi-Fi > Security: 802.1x + Static WEP ........................................................ 231
Figure 141 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX .............................................. 232
Figure 142 WIRELESS > Wi-Fi > Security: WPA(2)-PSK ..................................................................... 234
Figure 143 NETWORK > WIRELESS CARD > MAC Filter .................................................................. 235
Figure 144 Default Firewall Action ........................................................................................................ 239
Figure 145 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 240
Figure 146 Default Block Traffic From WAN1 to DMZ Example ....................................................... 241
Figure 147 From LAN to VPN Example ............................................................................................... 243
Figure 148 Block DMZ to VPN Traffic by Default Example ............................................................... 244
Figure 149 From VPN to LAN Example ............................................................................................... 245
Figure 150 Block VPN to LAN Traffic by Default Example ............................................................... 246
Figure 151 From VPN to VPN Example .............................................................................................. 247
Figure 152 Block VPN to VPN Traffic by Default Example ............................................................... 247
Figure 153 Blocking All LAN to WAN IRC Traffic Example .................................................................. 248
Figure 154 Limited LAN to WAN IRC Traffic Example .......................................................................... 249
Figure 155 Using IP Alias to Solve the Triangle Route Problem .......................................................... 251
Figure 156 SECURITY > FIREWALL > Default Rule (Router Mode) ................................................... 251
Figure 157 SECURITY > FIREWALL > Default Rule (Bridge Mode) .................................................... 254
Figure 158 SECURITY > FIREWALL > Rule Summary ....................................................................... 256
Figure 159 SECURITY > FIREWALL > Rule Summary > Edit ............................................................ 258
Figure 160 SECURITY > FIREWALL > Anti-Probing ........................................................................... 260
Figure 161 Three-Way Handshake ....................................................................................................... 261
Figure 162 SECURITY > FIREWALL > Threshold ............................................................................ 262
Figure 163 SECURITY > FIREWALL > Service ................................................................................... 264
Figure 164 Firewall Edit Custom Service ............................................................................................. 265
Figure 165 My Service Firewall Rule Example: Service ...................................................................... 266
Figure 166 My Service Firewall Rule Example: Edit Custom Service ................................................. 267
Figure 167 My Service Firewall Rule Example: Rule Summary ........................................................... 267