8.2
Levels of Security ...................................................................................................................... 8-1
8.3
Data Encryption with WEP ........................................................................................................ 8-2
8.4
Network Authentication ............................................................................................................. 8-3
8.5
Local User Authentication ......................................................................................................... 8-8
8.6
MAC Address Filtering............................................................................................................ 8-10
Chapter 9 Internet Access ....................................................................................................................... 9-1
9.1
9.2
Ethernet Encapsulation............................................................................................................... 9-1
9.3
PPTP Encapsulation ................................................................................................................... 9-2
9.4
PPPoE Encapsulation ................................................................................................................. 9-3
9.5
Basic Setup Complete ................................................................................................................ 9-5
Advanced Applications ................................................................................................................................. III
Chapter 10 Remote Node Setup............................................................................................................ 10-1
10.1
10.2
Remote Node Setup.............................................................................................................. 10-1
10.3
Remote Node Profile Setup.................................................................................................. 10-2
10.4
Edit IP .................................................................................................................................. 10-7
10.5
Remote Node Filter .............................................................................................................. 10-9
10.6
Traffic Redirect .................................................................................................................. 10-10
11.1
11.2
IP Static Route Setup............................................................................................................ 11-2
12.1
Introduction to NAT............................................................................................................. 12-1
12.2
Using NAT ........................................................................................................................... 12-6
12.3
NAT Setup ........................................................................................................................... 12-8
12.4
Table of Contents
ZyWALL 2 and ZyWALL 2WE
ix