List Of Figures - ZyXEL Communications ZyWALL 5 User Manual

Internet security appliance
Hide thumbs Also See for ZyWALL 5:
Table of Contents

Advertisement

ZyWALL 5 Internet Security Appliance

List of Figures

Figure 1-1 Secure Internet Access via Cable, DSL or Wireless Modem............................................. 1-6
Figure 1-2 VPN Application ................................................................................................................ 1-7
Figure 2-1 Change Password Screen ................................................................................................... 2-1
Figure 2-2 Replace Certificate Screen ................................................................................................. 2-2
Figure 2-3 Example Xmodem Upload ................................................................................................. 2-3
Figure 2-4 Web Configurator HOME Screen in Router Mode............................................................ 2-4
Figure 2-5 Web Configurator HOME Screen in Bridge Mode............................................................ 2-6
Figure 2-6 Home : Show Statistics .................................................................................................... 2-10
Figure 2-7 Home : DHCP Table ........................................................................................................ 2-11
Figure 2-8 Home : VPN Status .......................................................................................................... 2-12
Figure 3-1 ISP Parameters : Ethernet Encapsulation ........................................................................... 3-1
Figure 3-2 ISP Parameters : PPPoE Encapsulation.............................................................................. 3-3
Figure 3-3 ISP Parameters : PPTP Encapsulation ............................................................................... 3-4
Figure 3-4 WAN and DNS .................................................................................................................. 3-7
Figure 3-5 Internet Access Wizard Setup Complete............................................................................ 3-8
Figure 3-6 VPN Wizard : Gateway Setting ....................................................................................... 3-10
Figure 3-7 VPN Wizard : Network Setting........................................................................................ 3-11
Figure 3-8 Two Phases to Set Up the IPSec SA ................................................................................ 3-12
Figure 3-9 VPN Wizard : IKE Tunnel Setting................................................................................... 3-15
Figure 3-10 VPN Wizard : IPSec Setting .......................................................................................... 3-16
Figure 3-11 VPN Wizard : VPN Status ............................................................................................. 3-18
Figure 3-12 VPN Wizard Setup Complete ........................................................................................ 3-20
Figure 4-1 LAN.................................................................................................................................... 4-3
Figure 4-2 Static DHCP ....................................................................................................................... 4-6
Figure 4-3 Physical Network
Figure 4-4 Partitioned Logical Networks..................... 4-7
Figure 4-5 IP Alias............................................................................................................................... 4-7
Figure 4-6 Port Roles ........................................................................................................................... 4-9
Figure 4-7 Port Roles Change Complete ............................................................................................. 4-9
Figure 5-1 Bridge Loop: Bridge Connected to Wired LAN ................................................................ 5-1
Figure 5-2 Bridge................................................................................................................................. 5-3
Figure 6-1 RTS Threshold ................................................................................................................... 6-2
Figure 6-2 ZyWALL Wireless Security Levels ................................................................................... 6-3
Figure 6-3 Wireless.............................................................................................................................. 6-4
Figure 6-4 MAC Address Filter ........................................................................................................... 6-6
Figure 6-5 EAP Authentication ........................................................................................................... 6-8
Figure 6-6 802.1X Authentication ....................................................................................................... 6-9
Figure 6-7 Local User Database......................................................................................................... 6-10
Figure 6-8 RADIUS........................................................................................................................... 6-11
Figure 7-1 Route .................................................................................................................................. 7-2
Figure 7-2 Ethernet Encapsulation....................................................................................................... 7-3
Figure 7-3 PPPoE Encapsulation ......................................................................................................... 7-7
Figure 7-4 PPTP Encapsulation ........................................................................................................... 7-9
Figure 7-5 Traffic Redirect WAN Setup............................................................................................ 7-10
Figure 7-6 Traffic Redirect LAN Setup............................................................................................. 7-11
Figure 7-7 Traffic Redirect ................................................................................................................ 7-11
Figure 7-8 Dial Backup Setup............................................................................................................ 7-13
Figure 7-9 Advanced Setup ............................................................................................................... 7-17
Figure 7-10 DDNS............................................................................................................................. 7-19
Figure 8-1 DMZ................................................................................................................................... 8-2
xiv
List of Figures

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents