List Of Figures - ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Internet security gateway
Hide thumbs Also See for Internet Security Gateway ZyWALL 2 Series:
Table of Contents

Advertisement

ZyWALL 2 Series User's Guide

List of Figures

Figure 1-1 Secure Internet Access via Cable, DSL or Wireless Modem........................................................ 1-6
Figure 1-2 Secure Internet Access and VPN Application............................................................................... 1-7
Figure 2-1 Change Password Screen.............................................................................................................. 2-1
Figure 2-2 Replace Certificate Screen ........................................................................................................... 2-2
Figure 2-3 Example Xmodem Upload ........................................................................................................... 2-3
Figure 2-4 The MAIN MENU Screen of the Web Configurator.................................................................... 2-4
Figure 3-1 Wizard 1 ....................................................................................................................................... 3-2
Figure 3-2 Wizard 2: Ethernet Encapsulation ................................................................................................ 3-3
Figure 3-3 Wizard2: PPPoE Encapsulation.................................................................................................... 3-5
Figure 3-4 Wizard 2: PPTP Encapsulation..................................................................................................... 3-7
Figure 3-5 Wizard 3 ......................................................................................................................................3-11
Figure 3-6 Internet Access Wizard Setup Complete .................................................................................... 3-13
Figure 4-1 System General Setup .................................................................................................................. 4-1
Figure 4-2 DDNS ........................................................................................................................................... 4-4
Figure 4-3 Password....................................................................................................................................... 4-6
Figure 4-4 Time Setting ................................................................................................................................. 4-8
Figure 5-1 IP .................................................................................................................................................. 5-4
Figure 5-2 Static DHCP ................................................................................................................................. 5-7
Figure 5-4 Partitioned Logical Networks. .............................. 5-8
Figure 5-5 IP Alias ......................................................................................................................................... 5-8
......................................................................................................................... 6-3
Figure 6-2 Ethernet Encapsulation................................................................................................................. 6-4
Figure 6-3 PPPoE Encapsulation ................................................................................................................... 6-6
Figure 6-4 PPTP Encapsulation ..................................................................................................................... 6-8
Figure 6-5 IP Setup ...................................................................................................................................... 6-10
Figure 6-6 MAC Setup................................................................................................................................. 6-13
Figure 6-7 Traffic Redirect Setup Example ................................................................................................. 6-14
Figure 6-8 Traffic Redirect LAN Setup ....................................................................................................... 6-15
Figure 6-9 Traffic Redirect........................................................................................................................... 6-16
...................................................................................................................... 6-18
.......................................................................................................................... 6-24
Figure 7-1 RTS Threshold.............................................................................................................................. 7-2
Figure 7-2 ZyWALL Wireless Security Levels .............................................................................................. 7-3
Figure 7-3 Wireless ........................................................................................................................................ 7-4
Figure 7-4 MAC Address Filter ..................................................................................................................... 7-6
Figure 7-5 EAP Authentication ...................................................................................................................... 7-9
Figure 7-6 802.1X Authentication................................................................................................................ 7-10
Figure 8-1 How NAT Works .......................................................................................................................... 8-2
Figure 8-2 NAT Application With IP Alias .................................................................................................... 8-3
List of Figures
xv

Advertisement

Table of Contents
loading

Table of Contents