Many
Manuals
search
Kategorie
Marki
Strona główna
ZyXEL Communications
Sprzęt komputerowy
Internet Security Appliance ZyWALL5UTM 4.0
Instrukcja Użytkownika
Zyxel-communications Internet Security Appliance ZyWALL5UTM 4.0 Instrukcja Użytkownika Strona 4
Pobierz
Podziel się
Dzielenie się
Dodaj do moich podręczników
Drukuj
Strona
/
803
Spis treści
ROZWIĄZYWANIE PROBLEMÓW
BOOKMARKI
Oceniono
.
/ 5. Na podstawie
oceny klientów
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
ZyWALL 5/35/70 Series User’s Guide
Federal Com
munications
Commission
(FCC) Interf
erence St
atement
4
1
2
3
4
5
6
7
8
9
...
802
803
ZyWALL 5/35/70 Series
1
Copyright
2
Federal Communications
3
Statement
3
Safety Warnings
5
ZyXEL Limited Warranty
6
Customer Support
7
Customer Support 8
8
9 Customer Support
9
Table of Contents
10
Chapter 8
12
Chapter 9
12
Chapter 10
13
Chapter 27
19
Chapter 28
19
Table of Contents 26
26
27 Table of Contents
27
List of Figures
28
List of Tables
40
47 List of Tables
47
About This User's Guide
48
Related Documentation
48
User Guide Feedback
48
Syntax Conventions
49
Graphics Icons Key
49
CHAPTER 1
50
1.2.1 Physical Features
51
1.2.2 Non-Physical Features
52
1.3.2 VPN Application
58
1.3.3 Front Panel LEDs
59
Table 2 Front Panel LEDs
60
CHAPTER 2
62
2.3 Resetting the ZyWALL
63
Choose the Xmodem protocol
64
Then click Send
64
2.4.1 Router Mode
65
2.4.2 Bridge Mode
67
2.4.3 Navigation Panel
70
Table 6 Screens Summary
71
2.4.4 System Statistics
75
2.4.6 DHCP Table Screen
77
2.4.7 VPN Status
78
Figure 14 Home : VPN Status
79
Table 10 Home : VPN Status
79
CHAPTER 3
80
81 Chapter 3 Wizard Setup
81
3.2.1.2 PPPoE Encapsulation
82
3.2.1.3 PPTP Encapsulation
83
Chapter 3 Wizard Setup 84
84
85 Chapter 3 Wizard Setup
85
Chapter 3 Wizard Setup 86
86
87 Chapter 3 Wizard Setup
87
Chapter 3 Wizard Setup 88
88
89 Chapter 3 Wizard Setup
89
Chapter 3 Wizard Setup 90
90
91 Chapter 3 Wizard Setup
91
Chapter 3 Wizard Setup 92
92
93 Chapter 3 Wizard Setup
93
Chapter 3 Wizard Setup 94
94
95 Chapter 3 Wizard Setup
95
Chapter 3 Wizard Setup 96
96
97 Chapter 3 Wizard Setup
97
Chapter 3 Wizard Setup 98
98
99 Chapter 3 Wizard Setup
99
CHAPTER 4
100
4.2 Registration
101
Chapter 4 Registration 102
102
Table 20 Registration
102
4.3 Service
103
Chapter 4 Registration 104
104
Table 21 Service
104
105 Chapter 4 Registration
105
CHAPTER 5
106
5.3.3 RIP Setup
107
5.4 DNS Servers
108
5.5 LAN
108
109 Chapter 5 LAN Screens
109
Figure 35 LAN
109
Table 22 LAN
109
Chapter 5 LAN Screens 110
110
Table 22 LAN (continued)
110
5.6 LAN Static DHCP
111
5.7 LAN IP Alias
112
113 Chapter 5 LAN Screens
113
Figure 38 LAN IP Alias
113
Table 24 LAN IP Alias
113
5.8 LAN Port Roles
114
115 Chapter 5 LAN Screens
115
Figure 40 LAN Port Roles
115
Table 25 LAN Port Roles
115
Chapter 5 LAN Screens 116
116
117 Chapter 5 LAN Screens
117
CHAPTER 6
118
6.2.1 Rapid STP
119
6.2.2 STP Terminology
119
6.2.3 How STP Works
119
6.3 Bridge
120
121 Chapter 6 Bridge Screens
121
Figure 43 Bridge
121
Table 28 Bridge
121
6.4 Bridge Port Roles
122
123 Chapter 6 Bridge Screens
123
Figure 45 Bridge Port Roles
123
Table 29 Bridge Port Roles
123
Chapter 6 Bridge Screens 124
124
125 Chapter 6 Bridge Screens
125
CHAPTER 7
126
7.4.1 Least Load First
127
7.4.1.1 Example 1
128
7.4.1.2 Example 2
128
7.4.2 Weighted Round Robin
129
7.4.3 Spillover
129
7.5 TCP/IP Priority (Metric)
130
7.6 WAN General
130
131 Chapter 7 WAN Screens
131
Figure 50 WAN General
131
Chapter 7 WAN Screens 132
132
Table 32 WAN General
132
Algorithm field
133
7.7.1 Least Load First
134
7.7.2 Weighted Round Robin
135
7.7.3 Spillover
135
7.8 WAN Route
136
137 Chapter 7 WAN Screens
137
Figure 54 WAN Route
137
Table 36 WAN Route
137
Chapter 7 WAN Screens 138
138
7.11 WAN MAC Address
139
7.12 WAN
139
Chapter 7 WAN Screens 140
140
141 Chapter 7 WAN Screens
141
7.12.2 PPPoE Encapsulation
142
143 Chapter 7 WAN Screens
143
Chapter 7 WAN Screens 144
144
145 Chapter 7 WAN Screens
145
7.12.3 PPTP Encapsulation
146
147 Chapter 7 WAN Screens
147
Chapter 7 WAN Screens 148
148
7.13 Traffic Redirect
149
Chapter 7 WAN Screens 150
150
Figure 60 Traffic Redirect
150
Table 42 Traffic Redirect
150
7.15 Configuring Dial Backup
151
Chapter 7 WAN Screens 152
152
Figure 61 Dial Backup
152
153 Chapter 7 WAN Screens
153
Table 43 Dial Backup
153
Chapter 7 WAN Screens 154
154
7.16 Advanced Modem Setup
155
Chapter 7 WAN Screens 156
156
Figure 62 Advanced Setup
156
Table 44 Advanced Setup
156
157 Chapter 7 WAN Screens
157
CHAPTER 8
158
DMZ are on separate subnets
159
Chapter 8 DMZ Screens 160
160
Table 45 DMZ (continued)
160
8.3 DMZ Static DHCP
161
Chapter 8 DMZ Screens 162
162
Figure 64 DMZ Static DHCP
162
Table 46 DMZ Static DHCP
162
8.4 DMZ IP Alias
163
Chapter 8 DMZ Screens 164
164
165 Chapter 8 DMZ Screens
165
8.7 DMZ Port Roles
166
167 Chapter 8 DMZ Screens
167
Chapter 8 DMZ Screens 168
168
Figure 69 DMZ: Port Roles
168
Table 48 DMZ: Port Roles
168
169 Chapter 8 DMZ Screens
169
CHAPTER 9
170
Chapter 9 Wireless LAN 172
172
Table 49 WLAN (continued)
172
9.3 WLAN Static DHCP
173
9.4 WLAN IP Alias
174
175 Chapter 9 Wireless LAN
175
Figure 72 WLAN IP Alias
175
Table 51 WLAN IP Alias
175
9.5 WLAN Port Roles
176
177 Chapter 9 Wireless LAN
177
Figure 74 WLAN Port Roles
177
Table 52 WLAN Port Roles
177
9.6 Wireless Security
178
9.6.1 Encryption
179
9.6.2 Authentication
179
9.8 WEP Encryption
180
9.9 802.1x Overview
181
Chapter 9 Wireless LAN 182
182
9.11 Introduction to WPA
183
Chapter 9 Wireless LAN 184
184
9.13 Introduction to RADIUS
185
9.16 Wireless Card
186
187 Chapter 9 Wireless LAN
187
9.16.1 Static WEP
188
9.16.2 WPA-PSK
189
Chapter 9 Wireless LAN 190
190
9.16.3 WPA
191
Chapter 9 Wireless LAN 192
192
193 Chapter 9 Wireless LAN
193
9.16.6 IEEE 802.1x + No WEP
194
195 Chapter 9 Wireless LAN
195
9.17 MAC Filter
196
197 Chapter 9 Wireless LAN
197
CHAPTER 10
198
199 Chapter 10 Firewalls
199
10.4 Denial of Service
200
10.4.2 Types of DoS Attacks
201
Chapter 10 Firewalls 202
202
Figure 91 SYN Flood
202
10.4.2.1 ICMP Vulnerability
203
10.5 Stateful Inspection
204
205 Chapter 10 Firewalls
205
10.5.3 TCP Security
206
10.5.4 UDP/ICMP Security
207
10.5.5 Upper Layer Protocols
207
10.7.1 Packet Filtering:
208
10.7.2 Firewall
209
CHAPTER 11
210
11.3 Rule Logic Overview
212
11.4.1 LAN To WAN Rules
213
11.5 Alerts
214
11.8 Firewall Rule Summary
218
Table 69 Rule Summary
219
Table 70 Firewall Edit Rule
221
11.9 Anti-Probing
222
11.10 Firewall Threshold
223
11.11 Service
226
Figure 102 Firewall Service
227
Table 73 Firewall Service
227
11.11.2 Predefined Services
229
11.12 Example Firewall Rule
231
Figure 104 Service
232
Figure 106 Rule Summary
233
10.0.0.15 on the LAN
235
CHAPTER 12
236
12.1.2 IDS and IDP
237
12.1.3 Host IDP
237
12.1.4 Network IDP
237
12.1.5 Example Intrusions
238
12.1.6 ZyWALL IDP
239
CHAPTER 13
240
13.2 General Setup
241
13.3 IDP Signatures
242
Attack Type list box
243
13.3.2 Intrusion Severity
244
13.3.3 Signature Actions
244
Table 79 Signature Actions
245
Figure 115 IDP: Signatures
246
13.3.5 Query View
247
13.3.5.2 Query Example 2
249
13.4 Update
250
Table 81 Signatures Update
252
13.5 Backup and Restore
253
CHAPTER 14
254
255 Chapter 14 Anti-Virus
255
Chapter 14 Anti-Virus 256
256
257 Chapter 14 Anti-Virus
257
14.4 Signature Update
258
14.4.1 mySecurity Zone
259
Chapter 14 Anti-Virus 260
260
261 Chapter 14 Anti-Virus
261
CHAPTER 15
262
15.1.1.1 SpamBulk Engine
263
15.1.1.2 SpamRepute Engine
263
15.1.1.3 SpamContent Engine
263
15.1.2 Spam Threshold
264
15.1.3 Phishing
264
15.1.4 Whitelist
265
15.1.5 Blacklist
265
15.1.6 SMTP and POP3
265
15.1.7 MIME Headers
266
267 Chapter 15 Anti-Spam
267
Table 85 Anti-Spam: General
267
Chapter 15 Anti-Spam 268
268
269 Chapter 15 Anti-Spam
269
Chapter 15 Anti-Spam 270
270
Figure 127 Anti-Spam: Lists
270
Table 87 Anti-Spam: Lists
270
271 Chapter 15 Anti-Spam
271
Chapter 15 Anti-Spam 272
272
273 Chapter 15 Anti-Spam
273
CHAPTER 16
274
16.7 Content Filtering Cache
287
CHAPTER 17
290
Figure 137 Blue Coat: Login
292
17.3 Web Site Submission
295
CHAPTER 18
298
18.1.4 VPN Applications
299
18.2 IPSec Architecture
300
18.3 Encapsulation
300
18.4 IPSec and NAT
301
Table 93 VPN and NAT
302
CHAPTER 19
304
19.3 My ZyWALL
305
19.4 Remote Gateway Address
305
19.5 Nailed Up
306
19.6 NAT Traversal
306
19.7 ID Type and Content
307
Chapter 19 VPN Screens 308
308
19.8 IKE Phases
309
19.8.1 Negotiation Mode
310
19.8.2 Pre-Shared Key
310
19.9.1 Authentication Server
311
19.10 VPN Rules (IKE)
312
313 Chapter 19 VPN Screens
313
Chapter 19 VPN Screens 314
314
315 Chapter 19 VPN Screens
315
Chapter 19 VPN Screens 316
316
317 Chapter 19 VPN Screens
317
Chapter 19 VPN Screens 318
318
319 Chapter 19 VPN Screens
319
Chapter 19 VPN Screens 320
320
321 Chapter 19 VPN Screens
321
Chapter 19 VPN Screens 322
322
323 Chapter 19 VPN Screens
323
Chapter 19 VPN Screens 324
324
19.14 VPN Rules (Manual)
325
Chapter 19 VPN Screens 326
326
327 Chapter 19 VPN Screens
327
Chapter 19 VPN Screens 328
328
329 Chapter 19 VPN Screens
329
Chapter 19 VPN Screens 330
330
19.16 VPN SA Monitor
331
19.17 VPN Global Setting
332
333 Chapter 19 VPN Screens
333
Chapter 19 VPN Screens 334
334
335 Chapter 19 VPN Screens
335
Chapter 19 VPN Screens 336
336
337 Chapter 19 VPN Screens
337
CHAPTER 20
338
20.3 Configuration Summary
339
20.4 My Certificates
340
341 Chapter 20 Certificates
341
20.5 My Certificate Import
342
20.6 My Certificate Create
343
Chapter 20 Certificates 344
344
345 Chapter 20 Certificates
345
Chapter 20 Certificates 346
346
347 Chapter 20 Certificates
347
Chapter 20 Certificates 348
348
20.8 Trusted CAs
349
Chapter 20 Certificates 350
350
Figure 165 Trusted CAs
350
Table 114 Trusted CAs
350
20.9 Trusted CA Import
351
20.10 Trusted CA Details
352
353 Chapter 20 Certificates
353
Chapter 20 Certificates 354
354
355 Chapter 20 Certificates
355
Chapter 20 Certificates 356
356
357 Chapter 20 Certificates
357
Chapter 20 Certificates 358
358
359 Chapter 20 Certificates
359
Chapter 20 Certificates 360
360
361 Chapter 20 Certificates
361
20.15 Directory Servers
362
363 Chapter 20 Certificates
363
Table 120 Directory Servers
363
Chapter 20 Certificates 364
364
365 Chapter 20 Certificates
365
CHAPTER 21
366
21.3 RADIUS
368
Table 123 RADIUS
369
CHAPTER 22
370
22.1.2 What NAT Does
371
22.1.3 How NAT Works
371
22.1.4 NAT Application
372
22.1.6 NAT Mapping Types
373
22.2 Using NAT
374
22.3 NAT Overview
375
22.4 NAT Address Mapping
376
22.5 Port Forwarding
379
22.5.4 NAT and Multiple WAN
381
22.5.5 Port Translation
381
22.6 Port Forwarding
382
Figure 185 Port Forwarding
383
Table 130 Port Forwarding
383
22.7 Port Triggering
384
Figure 187 Port Triggering
385
Table 131 Port Triggering
385
CHAPTER 23
388
389 Chapter 23 Static Route
389
Figure 189 IP Static Route
389
Table 132 IP Static Route
389
Chapter 23 Static Route 390
390
391 Chapter 23 Static Route
391
CHAPTER 24
392
24.4 IP Routing Policy Setup
393
24.5 Policy Route Edit
394
395 Chapter 24 Policy Route
395
Chapter 24 Policy Route 396
396
397 Chapter 24 Policy Route
397
CHAPTER 25
398
25.7 Scheduler
400
Sales: 2048 kbps
401
Marketing: 2048 kbps
401
Research: 2048 kbps
401
25.8 Bandwidth Borrowing
403
25.10 Configuring Summary
404
25.12 Configuring Monitor
411
CHAPTER 26
414
26.4 Address Record
415
26.5 Name Server Record
415
26.6 System Screen
416
417 Chapter 26 DNS
417
Figure 200 System DNS
417
Table 147 System DNS
417
Chapter 26 DNS 418
418
419 Chapter 26 DNS
419
26.7 DNS Cache
420
26.8 Configure DNS Cache
421
26.9 Configuring DNS DHCP
422
423 Chapter 26 DNS
423
Figure 204 DNS DHCP
423
Table 151 DNS DHCP
423
26.10 Dynamic DNS
424
425 Chapter 26 DNS
425
Figure 205 DDNS
425
Table 152 DDNS
425
Chapter 26 DNS 426
426
427 Chapter 26 DNS
427
CHAPTER 27
428
27.2 Introduction to HTTPS
429
27.3 WWW
430
Figure 207 WWW
431
Table 153 WWW
431
27.4 HTTPS Example
432
27.4.4 Login Screen
434
27.5 SSH
437
27.6 How SSH works
437
Figure 217 How SSH Works
438
27.8 Configuring SSH
439
27.9.2 Example 2: Linux
440
27.11 Telnet
442
27.12 Configuring TELNET
442
27.13 FTP
443
27.14 SNMP
444
27.14.1 Supported MIBs
446
27.14.2 SNMP Traps
446
Figure 227 SNMP
447
Table 158 SNMP
447
27.15 DNS
448
27.17 Configuring CNM
449
Table 160 CNM (continued)
450
CHAPTER 28
452
28.2 Configuring UPnP
453
Chapter 28 UPnP 454
454
Figure 231 UPnP Ports
454
Table 161 UPnP
454
455 Chapter 28 UPnP
455
Table 162 UPnP Ports
455
Chapter 28 UPnP 456
456
457 Chapter 28 UPnP
457
Chapter 28 UPnP 458
458
459 Chapter 28 UPnP
459
Chapter 28 UPnP 460
460
461 Chapter 28 UPnP
461
CHAPTER 29
462
29.2 FTP
463
29.3 H.323
463
29.4 RTP
463
Chapter 29 ALG Screen 464
464
29.5 SIP
465
29.6 ALG Screen
466
467 Chapter 29 ALG Screen
467
Figure 236 ALG
467
Table 163 ALG
467
CHAPTER 30
468
30.2 Log Description Example
469
Chapter 30 Logs Screens 470
470
471 Chapter 30 Logs Screens
471
Chapter 30 Logs Screens 472
472
Figure 240 Log Settings
472
473 Chapter 30 Logs Screens
473
Table 166 Log Settings
473
30.4 Configuring Reports
474
475 Chapter 30 Logs Screens
475
Figure 241 Reports
475
Table 167 Reports
475
30.4.1 Viewing Web Site Hits
476
30.4.2 Viewing Protocol/Port
476
477 Chapter 30 Logs Screens
477
Chapter 30 Logs Screens 478
478
479 Chapter 30 Logs Screens
479
CHAPTER 31
480
31.3 Configuring Password
481
31.4 Time and Date
482
483 Chapter 31 Maintenance
483
Figure 247 Time and Date
483
Table 174 Time and Date
483
Chapter 31 Maintenance 484
484
31.5.1 Resetting the Time
485
Chapter 31 Maintenance 486
486
31.7 Transparent Firewalls
487
Chapter 31 Maintenance 488
488
489 Chapter 31 Maintenance
489
31.10 F/W Upload Screen
490
491 Chapter 31 Maintenance
491
Figure 253 Firmware Upload
491
Table 179 Firmware Upload
491
31.11 Backup and Restore
492
493 Chapter 31 Maintenance
493
Chapter 31 Maintenance 494
494
31.12 Restart Screen
495
CHAPTER 32
496
32.2.2 Entering the Password
497
32.3.1 Main Menu
498
Table 182 Main Menu Summary
499
32.3.2 SMT Menus Overview
500
32.5 Resetting the ZyWALL
503
CHAPTER 33
504
33.2.1.1 Editing DDNS Host
506
Figure 271 Menu 1.1.1:
507
DDNS Host Summary
507
CHAPTER 34
510
Edit Advanced Setup= No
510
34.3 Dial Backup
511
Edit Advanced Setup= Yes
512
[ENTER]
513
34.7 Editing PPP Options
516
34.8 Editing TCP/IP Options
517
34.9 Editing Login Script
519
34.10 Remote Node Filter
521
CHAPTER 35
522
523 Chapter 35 LAN Setup
523
Chapter 35 LAN Setup 524
524
525 Chapter 35 LAN Setup
525
35.4.1 IP Alias Setup
526
527 Chapter 35 LAN Setup
527
CHAPTER 36
528
36.5 Basic Setup Complete
531
CHAPTER 37
532
37.3.1 IP Address
533
37.3.2 IP Alias Setup
534
535 Chapter 37 DMZ Setup
535
CHAPTER 38
536
38.3 Traffic Redirect
537
38.4 Route Failover
538
539 Chapter 38 Route Setup
539
CHAPTER 39
540
Chapter 39 Wireless Setup 542
542
39.2 TCP/IP Setup
543
39.2.2 IP Alias Setup
544
CHAPTER 40
546
40.3.2 PPPoE Encapsulation
549
40.3.3 PPTP Encapsulation
550
40.4 Edit IP
551
40.5 Remote Node Filter
553
40.6 Traffic Redirect
554
CHAPTER 41
556
CHAPTER 42
558
42.2 NAT Setup
560
42.2.1 Address Mapping Sets
561
42.2.1.3 Ordering Your Rules
563
42.4 General NAT Examples
568
Section 42.4 on page 568
569
Figure 327 NAT Example 2
570
Figure 329 NAT Example 3
571
Figure 334 NAT Example 4
574
42.5 Trigger Port Forwarding
575
CHAPTER 43
578
CHAPTER 44
580
Len Length
584
(from 0) and the Length
588
Length= 0
588
44.3 Example Filter
589
44.4 Filter Types and NAT
591
44.5 Firewall Versus Filters
591
44.6 Applying a Filter
592
HTTP connections
593
CHAPTER 45
594
45.2 SNMP Traps
595
CHAPTER 46
596
46.3.1 System Information
598
46.3.2 Console Port Speed
599
46.4 Log and Trace
600
46.4.2 Syslog Logging
601
2 Packet triggered
602
3 Filter log
602
4 PPP log
603
5 Firewall log
603
46.5 Diagnostic
604
46.5.1 WAN DHCP
605
CHAPTER 47
608
47.3 Backup Configuration
609
47.3.4 GUI-based FTP Clients
611
47.3.7 TFTP Command Example
612
47.4 Restore Configuration
614
47.5.1 Firmware File Upload
617
47.5.5 TFTP File Upload
619
CHAPTER 48
624
48.1.2 Command Usage
625
48.2 Call Control Support
626
48.2.2 Call History
627
48.3 Time and Date Setting
628
CHAPTER 49
632
CHAPTER 50
636
50.2 IP Routing Policy Setup
637
(shown next)
639
CHAPTER 51
644
CHAPTER 52
648
Figure 403 Pop-up Blocker
651
52.5.1.2 JavaScripts
654
3 Scroll down to Scripting
655
52.5.1.3 Java Permissions
656
52.5.1.3.1 JAVA (Sun)
657
52.6 Packet Flow
658
APPENDIX A
660
Table 249 Performance
661
Compatible ZyXEL WLAN Cards
664
Cable Pin Assignments
665
APPENDIX B
668
Rack-Mounted Installation
669
Figure 416 Rack Mounting
670
APPENDIX C
672
APPENDIX D
674
Installing Components
675
Configuring
676
Windows 2000/NT/XP
677
Macintosh OS 8/9
682
Macintosh OS X
684
Verifying Settings
685
Using Configuration Files
687
APPENDIX E
690
Subnet Masks
691
Subnetting
691
Example: Two Subnets
692
693 Appendix E IP Subnetting
693
Table 259 Subnet 1
693
Table 260 Subnet 2
693
Example: Four Subnets
694
Example Eight Subnets
695
Appendix E IP Subnetting 696
696
697 Appendix E IP Subnetting
697
APPENDIX F
698
How PPPoE Works
699
ZyWALL as a PPPoE Client
699
APPENDIX G
700
PPTP Protocol Overview
701
Control & PPP Connections
701
PPP Data Connection
702
703 Appendix G PPTP
703
APPENDIX H
704
705 Appendix H Wireless LANs
705
Appendix H Wireless LANs 706
706
Fragmentation Threshold
707
Preamble Type
708
IEEE 802.1x
709
EAP Authentication
710
Types of Authentication
711
WEP Authentication Steps
712
Dynamic WEP Key Exchange
713
User Authentication
714
Encryption
714
Security Parameters Summary
715
Appendix H Wireless LANs 716
716
Figure 451 Roaming Example
716
Requirements for Roaming
717
APPENDIX I
718
IP Aliasing
719
Gateways on the WAN Side
720
APPENDIX J
722
Figure 456 on page 722)
725
APPENDIX K
726
VPN Configuration
727
Appendix K VPN Setup 728
728
Figure 464
728
729 Appendix K VPN Setup
729
Appendix K VPN Setup 730
730
731 Appendix K VPN Setup
731
Appendix K VPN Setup 732
732
Figure 469
732
733 Appendix K VPN Setup
733
Figure 471 VPN Dial
733
VPN Troubleshooting
734
735 Appendix K VPN Setup
735
Figure 473 VPN Log Example
735
IPSec Debug
736
Use a VPN Tunnel
737
APPENDIX L
738
Figure 476 Login Screen
739
APPENDIX M
750
APPENDIX N
752
APPENDIX O
758
NetBIOS Filter Configuration
759
APPENDIX P
762
APPENDIX Q
766
APPENDIX R
768
769 Appendix R Boot Commands
769
APPENDIX S
770
Table 278 TCP Reset Logs
773
Table 280 ICMP Logs
774
Table 281 CDR Logs
774
Table 282 PPP Logs
774
Table 283 UPnP Logs
775
Table 285 Attack Logs
776
Table 287 Wireless Logs
778
Table 288 IPSec Logs
778
Table 289 IKE Logs
779
Table 290 PKI Logs
782
Table 292 802.1X Logs
783
Table 294 ICMP Notes
785
Table 295 IDP Logs
786
Table 296 AV Logs
787
Table 297 AS Logs
788
Syslog Logs
790
Log Commands
792
Log Command Example
793
Numerics
794
795 Index
795
Index 796
796
797 Index
797
Index 798
798
799 Index
799
Index 800
800
801 Index
801
Index 802
802
803 Index
803
Komentarze do niniejszej Instrukcji
Brak uwag
Publish
Powiązane produkty i podręczniki dla Sprzęt komputerowy Zyxel-communications Internet Security Appliance ZyWALL5UTM 4.0
Sprzęt komputerowy Zyxel-communications P-660RU-Tx v3s SERIES Instrukcja Użytkownika
(2 strony)
Sprzęt komputerowy Zyxel-communications ZyAIR G-220 Instrukcja Użytkownika
(67 strony)
Sprzęt komputerowy Zyxel-communications PRESTIGE 324 Instrukcja Użytkownika
(10 strony)
Sprzęt komputerowy Zyxel-communications P-2608HWL-DX Instrukcja Użytkownika
(8 strony)
Sprzęt komputerowy Zyxel-communications 660HW Series Instrukcja Użytkownika
(460 strony)
Sprzęt komputerowy Zyxel-communications P-320W Instrukcja Użytkownika
(2 strony)
Sprzęt komputerowy Zyxel-communications 802.11g Wireless USB Adapter ZyXEL G-200 Instrukcja Użytkownika
(11 strony)
Sprzęt komputerowy Zyxel-communications ZyXEL Vantage VSG-1000 Instrukcja Użytkownika
(131 strony)
Sprzęt komputerowy Zyxel-communications ZyXEL ZyAIR AG-220 Instrukcja Użytkownika
(114 strony)
Sprzęt komputerowy Zyxel-communications ADSL2+ 4-port Gateway P-660H-D1 Instrukcja Użytkownika
(6 strony)
Sprzęt komputerowy Zyxel-communications 802.11g Wireless Access Point ZyXEL G-560 Instrukcja Użytkownika
(144 strony)
Sprzęt komputerowy Zyxel-communications P-660HW-D Series Instrukcja Użytkownika
(339 strony)
Sprzęt komputerowy Zyxel-communications ISDN Terminal Adapter Omni.Net Lite Instrukcja Użytkownika
(84 strony)
Sprzęt komputerowy Zyxel-communications ADSL-Modem Instrukcja Użytkownika
(20 strony)
Sprzęt komputerowy Zyxel-communications ZYWALL 35 Instrukcja Użytkownika
(2 strony)
Sprzęt komputerowy Zyxel-communications P-660HW-D Instrukcja Użytkownika
(6 strony)
Sprzęt komputerowy Zyxel-communications P-660H Series Instrukcja Użytkownika
(9 strony)
Sprzęt komputerowy Zyxel-communications ISDN Internet Access Router 202H Plus Instrukcja Użytkownika
(24 strony)
Sprzęt komputerowy Zyxel-communications Internet Security Gateway ZyWALL 100 Instrukcja Użytkownika
(356 strony)
Sprzęt komputerowy Zyxel-communications ADSL2+ Ethernet / USB Router P-660RU-Tx v2 Instrukcja Użytkownika
(22 strony)
Drukuj dokument
Drukuj stronę 4
Komentarze do niniejszej Instrukcji