
Vantage CNM User’s Guide
18
Figure 39 Device Operation > Device Configuration > Network > WAN > WAN1/2 - PPTP (ZyNOS ZyWALL
with two WAN ports) ..................................................................................................... 83
Figure 40 Device Operation > Device Configuration > Network > WAN > Dial Backup (ZyNOS ZyWALL)
86
Figure 41 Device Operation > Device Configuration > Network > WAN > Dial Backup > Advanced (ZyNOS
ZyWALL) ....................................................................................................................... 88
Figure 42 Device Operation > Device Configuration > Network > WAN > Dial Backup > Edit (ZyNOS
ZyWALL) ....................................................................................................................... 90
Figure 43 Device Operation > Device Configuration > Network > WAN > Setup (Prestige) .................. 92
Figure 44 Device Operation > Device Configuration > Network > WAN > Backup (Prestige) ................ 95
Figure 45 Device Operation > Device Configuration > Network > WAN > Backup > Advanced (Prestige)
97
Figure 46 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card ..... 100
Figure 47 Device Operation > Device Configuration > Network > Wireless Card > Wireless Card
(Advanced Wireless Security Settings) ....................................................................... 102
Figure 48 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter ........... 107
Figure 49 Example: Device Operation > Device Configuration > VPN > IPSec VPN (ZLD) ................ 109
Figure 50 Device Operation > Device Configuration > Security > Firewall > Default Rule ....................110
Figure 51 Device Operation > Device Configuration > Security > Firewall > Rule Summary ................112
Figure 52 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Edit .....114
Figure 53 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ....................116
Figure 54 Device Operation > Device Configuration > Security > Firewall > Threshold .......................117
Figure 55 Device Operation > Device Configuration > Security > Firewall > Service ...........................119
Figure 56 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 120
Figure 57 IPSec High Availability ......................................................................................................... 121
Figure 58 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) ................. 122
Figure 59 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway
Policy Add/Edit ........................................................................................................... 123
Figure 60 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Add/Edit ...................................................................................................................... 129
Figure 61 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Move ...........................................................................................................................133
Figure 62 Device Operation > Device Configuration > VPN > Manual-Key IPSec ............................... 134
Figure 63 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit
136
Figure 64 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 139
Figure 65 Device Operation > Device Configuration > Security > Anti-Virus > General ....................... 141
Figure 66 Device Operation > Device Configuration > Security > Anti-Spam > General ..................... 143
Figure 67 Device Operation > Device Configuration > Security > Anti-Spam > External DB ............... 145
Figure 68 Device Operation > Device Configuration > Security > Anti-Spam > Lists ........................... 147
Figure 69 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit ......... 149
Figure 70 Device Operation > Device Configuration > Security > IDP > General ................................ 151
Figure 71 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 153
Figure 72 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 154
Figure 73 Device Operation > Device Configuration > Security > IDP > Signature ............................. 155
Comentarios a estos manuales