Zyxel-communications Centralized Network Management Vantage CNM Manual de usuario Pagina 26

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 430
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 25
Vantage CNM User’s Guide
26
Table 37 Wireless Card: No Access 802.1x + Static WEP .................................................................. 106
Table 38 Wireless Card: No Access 802.1x + No WEP ....................................................................... 106
Table 39 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter ............ 107
Table 40 Device Operation > Device Configuration > Security > Firewall > Default Rule ....................110
Table 41 Device Operation > Device Configuration > Security > Firewall > Rule Summary ................112
Table 42 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Add/Edit 115
Table 43 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ....................117
Table 44 Device Operation > Device Configuration > Security > Firewall > Threshold ........................118
Table 45 Device Operation > Device Configuration > Security > Firewall > Service ............................119
Table 46 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 120
Table 47 Device Operation > Device Configuration > Security > VPN > VPN Rules .......................... 122
Table 48 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway Policy
Add/Edit ..................................................................................................................... 124
Table 49 Device Operation > Device Configuration > VPN > IKE IPSec ............................................. 130
Table 50 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Move ..........................................................................................................................134
Table 51 Configuration > VPN > Manual-Key IPSec ........................................................................... 135
Table 52 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit
136
Table 53 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 139
Table 54 Device Operation > Device Configuration > Security > Anti-Virus > General ....................... 141
Table 55 Device Operation > Device Configuration > Security > Anti-Spam > General ...................... 143
Table 56 Device Operation > Device Configuration > Security > Anti-Spam > External DB ................ 146
Table 57 Device Operation > Device Configuration > Security > Anti-Spam > Lists ............................ 147
Table 58 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit .......... 149
Table 59 Device Operation > Device Configuration > Security > IDP > General ................................. 151
Table 60 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 153
Table 61 Device Operation > Device Configuration > Security > IDP > Signature > Intrusion Severity 154
Table 62 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 155
Table 63 Device Operation > Device Configuration > Security > IDP > Signature .............................. 156
Table 64 Device Operation > Device Configuration > Security > IDP > Signature (Query View) ........ 157
Table 65 Device Operation > Device Configuration > Security > Signature Update ............................ 160
Table 66 Device Operation > Device Configuration > Security > Content Filter > General ................. 162
Table 67 Device Operation > Device Configuration > Security > Content Filter > Policy .................... 165
Table 68 Device Operation > Device Configuration > Security > Content Filter > Policy > Add/General ..
167
Table 69 Device Operation > Device Configuration > Security > Content Filter > Policy > External Database
168
Table 70 Device Operation > Device Configuration > Security > Content Filter > Policy > Customization
176
Table 71 Device Operation > Device Configuration > Security > Content Filter > Policy > Schedule . 178
Table 72 Device Operation > Device Configuration > Security > Content Filter > Object ................... 180
Table 73 Device Operation > Device Configuration > Security > Content Filter > Cache ................... 181
Table 74 Device Operation > Device Configuration > Security > X Auth > Local User ....................... 182
Vista de pagina 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 429 430

Comentarios a estos manuales

Sin comentarios