ZyXEL 35 用户指南
ZyWALL 35 Support Notes
3
Check Point with ZyWALL VPN Tunneling ............................178
FortiNet with ZyWALL VPN Tunneling ...................................213
Remote Access VPN Scenario .................................................................227
Using xAuth for User Authentication ................................................228
ZyXEL VPN Client to ZyWALL Tunneling ......................................230
Flexible Wireless Connection and Security ...........................................239
Deploy the ZyWALL WLAN security policy....................................240
Threat Management ...........................................................................................244
To protect computer networks against virus intrusions and attacks
from Internet ............................................................................................245
To Control IM/P2P Applications Usage to Increase Employee
Productivity ..............................................................................................251
To filter non-work related and unproductive web surfing to mitigate
spyware and phishing threats .................................................................256
To eliminate spam mails to block unwanted messages everyday.........266
Threat Reports....................................................................................................271
Centralized Management ...................................................................................276
Using Vantage CNM for Management ...................................................276
FAQ ...........................................................................................................................281
A. Product FAQ .................................................................................................281
A01. What is the ZyWALL Internet Access Sharing Router? .............281
A02. Will the ZyWALL work with my Internet connection?...............281
A03. What do I need to use the ZyWALL?............................................281
A04. What is PPPoE? ..............................................................................281
A05. Does the ZyWALL support PPPoE?..............................................282
A06. How do I know I am using PPPoE? ..............................................282
A07. Why does my Internet Service Provider use PPPoE?..................282
A08. How can I configure the ZyWALL? ..............................................282
A09. What can we do with ZyWALL? ...................................................282
A10. Does ZyWALL support dynamic IP addressing? .........................282
A11. What is the difference between the internal IP and the real IP
from my ISP?............................................................................................282
A12. How does e-mail work through the ZyWALL? ............................283
A13. Is it possible to access a server running behind NAT from the
outside Internet? If possible, how?.........................................................283
A14. What DHCP capability does the ZyWALL support?...................283
A15. What are the capability of wireless feature of ZyWALL.............283
A16. What is the coverage range of Wireless in ZyWALL?.................283
All contents copyright (c) 2006 ZyXEL Communications Corporation.