ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual

Page 29

Advertising
background image

ZyWALL 5/35/70 Series User’s Guide

29

List of Figures

Figure 39 WLAN Port Role Example .................................................................................. 114
Figure 40 LAN Port Roles ................................................................................................... 115
Figure 41 Port Roles Change Complete ............................................................................. 116
Figure 42 Bridge Loop: Bridge Connected to Wired LAN ................................................... 118
Figure 43 Bridge .................................................................................................................. 121
Figure 44 WLAN Port Role Example .................................................................................. 123
Figure 45 Bridge Port Roles ................................................................................................ 123
Figure 46 Port Roles Change Complete ............................................................................. 124
Figure 47 Least Load First Example .................................................................................. 128
Figure 48 Weighted Round Robin Algorithm Example ........................................................ 129
Figure 49 Spillover Algorithm Example ............................................................................... 130
Figure 50 WAN General ...................................................................................................... 131
Figure 51 Load Balancing: Least Load First ....................................................................... 134
Figure 52 Load Balancing: Weighted Round Robin ............................................................ 135
Figure 53 Load Balancing: Spillover .................................................................................... 136
Figure 54 WAN Route ......................................................................................................... 137
Figure 55 WAN: Ethernet Encapsulation ............................................................................. 140
Figure 56 WAN: PPPoE Encapsulation ............................................................................... 143
Figure 57 WAN: PPTP Encapsulation ................................................................................. 146
Figure 58 Traffic Redirect WAN Setup ................................................................................ 149
Figure 59 Traffic Redirect LAN Setup ................................................................................. 150
Figure 60 Traffic Redirect .................................................................................................... 150
Figure 61 Dial Backup ......................................................................................................... 152
Figure 62 Advanced Setup .................................................................................................. 156
Figure 63 DMZ .................................................................................................................... 159
Figure 64 DMZ Static DHCP ............................................................................................... 162
Figure 65 DMZ: IP Alias ...................................................................................................... 163
Figure 66 DMZ Public Address Example ............................................................................ 165
Figure 67 DMZ Private and Public Address Example ......................................................... 166
Figure 68 WLAN Port Role Example .................................................................................. 167
Figure 69 DMZ: Port Roles ................................................................................................. 168
Figure 70 WLAN .................................................................................................................. 171
Figure 71 WLAN Static DHCP ............................................................................................. 174
Figure 72 WLAN IP Alias .................................................................................................... 175
Figure 73 WLAN Port Role Example .................................................................................. 176
Figure 74 WLAN Port Roles ................................................................................................ 177
Figure 75 WLAN Port Roles Change Complete .................................................................. 178
Figure 76 ZyWALL Wireless Security Levels ...................................................................... 179
Figure 77 EAP Authentication ............................................................................................. 182
Figure 78 WPA-PSK Authentication .................................................................................... 185
Figure 79 WPA with RADIUS Application Example ............................................................ 186
Figure 80 Wireless Card: No Security ................................................................................. 187
Figure 81 Wireless Card: Static WEP ................................................................................. 189

Advertising