ZyXEL Communications vantage cnm Dust Collector User Manual


 
Vantage CNM User’s Guide
26
Table 37 Wireless Card: 802.1x + Static WEP ......................................................................................110
Table 38 Wireless Card: 802.1x + No WEP ..........................................................................................110
Table 39 Wireless Card: No Access 802.1x + Static WEP ...................................................................111
Table 40 Wireless Card: No Access 802.1x + No WEP ........................................................................111
Table 41 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter .............112
Table 42 Device Operation > Device Configuration > Security > Firewall > Default Rule ....................116
Table 43 Device Operation > Device Configuration > Security > Firewall > Rule Summary ................118
Table 44 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Add/Edit 121
Table 45 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ................... 123
Table 46 Device Operation > Device Configuration > Security > Firewall > Threshold ....................... 124
Table 47 Device Operation > Device Configuration > Security > Firewall > Service ........................... 125
Table 48 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 126
Table 49 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) ................. 128
Table 50 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway Policy
Add/Edit ..................................................................................................................... 130
Table 51 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Add/Edit ..................................................................................................................... 136
Table 52 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Move ..........................................................................................................................140
Table 53 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) ........... 141
Table 54 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit
143
Table 55 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 145
Table 56 Device Operation > Device Configuration > Security > Anti-Virus > General ....................... 147
Table 57 Device Operation > Device Configuration > Security > Anti-Spam > General ...................... 149
Table 58 Device Operation > Device Configuration > Security > Anti-Spam > External DB ................ 152
Table 59 Device Operation > Device Configuration > Security > Anti-Spam > Lists ............................ 153
Table 60 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit .......... 155
Table 61 Device Operation > Device Configuration > Security > IDP > General ................................. 157
Table 62 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 159
Table 63 Device Operation > Device Configuration > Security > IDP > Signature > Intrusion Severity 160
Table 64 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 161
Table 65 Device Operation > Device Configuration > Security > IDP > Signature .............................. 162
Table 66 Device Operation > Device Configuration > Security > IDP > Signature (Query View) ........ 163
Table 67 Device Operation > Device Configuration > Security > IDP > Anomaly ............................... 166
Table 68 Device Operation > Device Configuration > Security > Signature Update ............................ 168
Table 69 Device Operation > Device Configuration > Security > Content Filter > General ................. 170
Table 70 Device Operation > Device Configuration > Security > Content Filter > Policy .................... 173
Table 71 Device Operation > Device Configuration > Security > Content Filter > Policy > Add/General ..
174
Table 72 Device Operation > Device Configuration > Security > Content Filter > Policy > External Database
176
Table 73 Device Operation > Device Configuration > Security > Content Filter > Policy > Customization
184