ZyXEL Communications ZYWALL 35 User Manual page 33

Internet security appliance
Hide thumbs Also See for ZYWALL 35:
Table of Contents

Advertisement

List of Figures
Figure 82 NETWORK > LAN > IP Alias ................................................................................................ 157
Figure 83 NETWORK > LAN > Port Roles ........................................................................................... 159
Figure 84 Port Roles Change Complete ............................................................................................... 159
Figure 85 Bridge Loop: Bridge Connected to Wired LAN ..................................................................... 161
Figure 86 NETWORK > Bridge ............................................................................................................. 164
Figure 87 NETWORK > Bridge > Port Roles ........................................................................................ 166
Figure 88 Port Roles Change Complete ............................................................................................... 166
Figure 89 Least Load First Example .................................................................................................... 169
Figure 90 Weighted Round Robin Algorithm Example ......................................................................... 170
Figure 91 Spillover Algorithm Example ................................................................................................. 170
Figure 92 Incorrect WAN IP .................................................................................................................. 171
Figure 93 NETWORK > WAN (General) ............................................................................................. 173
Figure 94 Load Balancing: Least Load First ......................................................................................... 176
Figure 95 Load Balancing: Weighted Round Robin ............................................................................. 177
Figure 96 Load Balancing: Spillover ..................................................................................................... 178
....................................................... 181
Figure 98 NETWORK > WAN > WAN (PPPoE Encapsulation) ........................................................... 184
Figure 99 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................................. 187
.................................................................................. 191
Figure 101 Traffic Redirect WAN Setup ................................................................................................ 195
Figure 102 Traffic Redirect LAN Setup ................................................................................................. 195
Figure 103 NETWORK > WAN > Traffic Redirect ................................................................................ 196
................................................................................... 197
Figure 105 NETWORK > WAN > Dial Backup > Edit ......................................................................... 200
Figure 106 NETWORK > DMZ ............................................................................................................ 204
Figure 107 NETWORK > DMZ > Static DHCP ................................................................................... 206
Figure 108 NETWORK > DMZ > IP Alias ............................................................................................ 208
Figure 109 DMZ Public Address Example ............................................................................................ 209
Figure 110 DMZ Private and Public Address Example ......................................................................... 210
Figure 111 NETWORK > DMZ > Port Roles .........................................................................................211
Figure 112 NETWORK > WLAN .......................................................................................................... 214
Figure 113 NETWORK > WLAN > Static DHCP .................................................................................. 217
Figure 114 NETWORK > WLAN > IP Alias ......................................................................................... 218
Figure 115 WLAN Port Role Example ................................................................................................. 219
Figure 116 NETWORK > WLAN > Port Roles ..................................................................................... 220
Figure 117 NETWORK > WLAN > Port Roles: Change Complete ....................................................... 221
Figure 118 ZyWALL Wireless Security Levels ...................................................................................... 221
Figure 119 EAP Authentication ............................................................................................................. 224
Figure 120 WPA-PSK Authentication ................................................................................................... 227
Figure 121 WPA with RADIUS Application Example ............................................................................ 228
Figure 122 WIRELESS > Wi-Fi > Wireless Card: No Security ............................................................. 229
Figure 123 WIRELESS > Wi-Fi > Wireless Card: Static WEP .............................................................. 231
Figure 124 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK ............................................................... 232
33
ZyWALL 5/35/70 Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents