beautypg.com

List of figures – ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Page 15

background image

ZyWALL 2 Series User’s Guide

List of Figures

xv

List of Figures

Figure 1-1 Secure Internet Access via Cable, DSL or Wireless Modem........................................................ 1-6

Figure 1-2 Secure Internet Access and VPN Application............................................................................... 1-7

Figure 2-1 Change Password Screen.............................................................................................................. 2-1

Figure 2-2 Replace Certificate Screen ........................................................................................................... 2-2

Figure 2-3 Example Xmodem Upload ........................................................................................................... 2-3

Figure 2-4 The MAIN MENU Screen of the Web Configurator.................................................................... 2-4

Figure 3-1 Wizard 1 ....................................................................................................................................... 3-2

Figure 3-2 Wizard 2: Ethernet Encapsulation ................................................................................................ 3-3

Figure 3-3 Wizard2: PPPoE Encapsulation.................................................................................................... 3-5

Figure 3-4 Wizard 2: PPTP Encapsulation..................................................................................................... 3-7

Figure 3-5 Wizard 3 ......................................................................................................................................3-11

Figure 3-6 Internet Access Wizard Setup Complete .................................................................................... 3-13

Figure 4-1 System General Setup .................................................................................................................. 4-1

Figure 4-2 DDNS........................................................................................................................................... 4-4

Figure 4-3 Password....................................................................................................................................... 4-6

Figure 4-4 Time Setting ................................................................................................................................. 4-8

Figure 5-1 IP .................................................................................................................................................. 5-4

Figure 5-2 Static DHCP ................................................................................................................................. 5-7

Figure 5-3 Physical Network Figure 5-4 Partitioned Logical Networks. .............................. 5-8

Figure 5-5 IP Alias ......................................................................................................................................... 5-8

Figure 6-1

WAN Setup: Route

......................................................................................................................... 6-3

Figure 6-2 Ethernet Encapsulation................................................................................................................. 6-4

Figure 6-3 PPPoE Encapsulation ................................................................................................................... 6-6

Figure 6-4 PPTP Encapsulation ..................................................................................................................... 6-8

Figure 6-5 IP Setup ...................................................................................................................................... 6-10

Figure 6-6 MAC Setup................................................................................................................................. 6-13

Figure 6-7 Traffic Redirect Setup Example ................................................................................................. 6-14

Figure 6-8 Traffic Redirect LAN Setup ....................................................................................................... 6-15

Figure 6-9 Traffic Redirect........................................................................................................................... 6-16

Figure 6-10 Dial Backup Setup

...................................................................................................................... 6-18

Figure 6-11 Advanced Setup

.......................................................................................................................... 6-24

Figure 7-1 RTS Threshold.............................................................................................................................. 7-2

Figure 7-2 ZyWALL Wireless Security Levels .............................................................................................. 7-3

Figure 7-3 Wireless ........................................................................................................................................ 7-4

Figure 7-4 MAC Address Filter ..................................................................................................................... 7-6

Figure 7-5 EAP Authentication ...................................................................................................................... 7-9

Figure 7-6 802.1X Authentication................................................................................................................ 7-10

Figure 8-1 How NAT Works .......................................................................................................................... 8-2

Figure 8-2 NAT Application With IP Alias .................................................................................................... 8-3