ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual

Page 12

Advertising
background image

ZyWALL 5/35/70 Series User’s Guide

Table of Contents

12

7.4.2 Weighted Round Robin ...........................................................................129
7.4.3 Spillover ..................................................................................................129

7.5 TCP/IP Priority (Metric) ....................................................................................130
7.7 Configuring Load Balancing .............................................................................133

7.7.1 Least Load First ......................................................................................134
7.7.2 Weighted Round Robin ...........................................................................135
7.7.3 Spillover ..................................................................................................135

7.9 WAN IP Address Assignment ...........................................................................138
7.10 DNS Server Address Assignment ..................................................................138
7.11 WAN MAC Address ........................................................................................139

7.12.1 WAN Ethernet Encapsulation ...............................................................139
7.12.2 PPPoE Encapsulation ...........................................................................142
7.12.3 PPTP Encapsulation .............................................................................146

7.14 Configuring Traffic Redirect ............................................................................150

7.16.1 AT Command Strings ............................................................................155
7.16.2 DTR Signal ...........................................................................................155
7.16.3 Response Strings ..................................................................................155

7.17 Configuring Advanced Modem Setup ............................................................155

Chapter 8
DMZ Screens ........................................................................................................
158

8.2 Configuring DMZ ..............................................................................................158
8.5 DMZ Public IP Address Example .....................................................................164
8.6 DMZ Private and Public IP Address Example ..................................................165

Chapter 9
Wireless LAN ........................................................................................................
170

9.1 Wireless LAN Introduction ................................................................................170

9.1.1 Additional Installation Requirements for Using 802.1x ...........................170

9.6 Wireless Security .............................................................................................178

9.6.1 Encryption ...............................................................................................179
9.6.2 Authentication .........................................................................................179
9.6.3 Restricted Access ...................................................................................180
9.6.4 Hide ZyWALL Identity .............................................................................180

9.7 Security Parameters Summary ........................................................................180
9.8 WEP Encryption ...............................................................................................180
9.9 802.1x Overview ..............................................................................................181

9.9.1 Introduction to RADIUS ..........................................................................181

9.9.1.1 Types of RADIUS Messages .........................................................181

9.9.2 EAP Authentication Overview .................................................................182

9.10 Dynamic WEP Key Exchange ........................................................................182
9.11 Introduction to WPA ........................................................................................183

9.11.1 User Authentication ...............................................................................183

Advertising