ZyXEL Communications vantage cnm Dust Collector User Manual


 
Vantage CNM User’s Guide
18
Figure 39 Device Operation > Device Configuration > Network > WAN > WAN1/2 - PPTP (ZyNOS ZyWALL
with two WAN ports) ..................................................................................................... 83
Figure 40 Device Configuration > Network > WAN > 3G(WAN 2) ......................................................... 87
Figure 41 Device Operation > Device Configuration > Network > WAN > Dial Backup (ZyNOS ZyWALL)
91
Figure 42 Device Operation > Device Configuration > Network > WAN > Dial Backup > Advanced (ZyNOS
ZyWALL) ....................................................................................................................... 93
Figure 43 Device Operation > Device Configuration > Network > WAN > Dial Backup > Edit (ZyNOS
ZyWALL) ....................................................................................................................... 95
Figure 44 Device Operation > Device Configuration > Network > WAN > Setup (Prestige) .................. 97
Figure 45 Device Operation > Device Configuration > Network > WAN > Backup (Prestige) .............. 100
Figure 46 Device Operation > Device Configuration > Network > WAN > Backup > Advanced (Prestige)
102
Figure 47 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card ..... 105
Figure 48 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card
(Advanced Wireless Security Settings) ....................................................................... 107
Figure 49 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter ............112
Figure 50 Example: Device Operation > Device Configuration > VPN > IPSec VPN (ZLD) .................115
Figure 51 Device Operation > Device Configuration > Security > Firewall > Default Rule ....................116
Figure 52 Device Operation > Device Configuration > Security > Firewall > Rule Summary ................118
Figure 53 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Edit .... 120
Figure 54 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ................... 122
Figure 55 Device Operation > Device Configuration > Security > Firewall > Threshold ...................... 123
Figure 56 Device Operation > Device Configuration > Security > Firewall > Service .......................... 125
Figure 57 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 126
Figure 58 IPSec High Availability ......................................................................................................... 127
Figure 59 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) ................. 128
Figure 60 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway
Policy Add/Edit ........................................................................................................... 129
Figure 61 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Add/Edit ...................................................................................................................... 135
Figure 62 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Move ...........................................................................................................................140
Figure 63 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) ........... 141
Figure 64 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit
142
Figure 65 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 145
Figure 66 Device Operation > Device Configuration > Security > Anti-Virus > General ....................... 147
Figure 67 Device Operation > Device Configuration > Security > Anti-Spam > General ..................... 149
Figure 68 Device Operation > Device Configuration > Security > Anti-Spam > External DB ............... 151
Figure 69 Device Operation > Device Configuration > Security > Anti-Spam > Lists ........................... 153
Figure 70 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit ......... 155
Figure 71 Device Operation > Device Configuration > Security > IDP > General ................................ 157
Figure 72 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 159
Figure 73 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 160