beautypg.com

ZyXEL Communications Parental Control Gateway HS100/HS100W User Manual

Page 14

background image

HomeSafe User’s Guide

xiv

List of Figures

Figure 4-2 SYSTEM : DDNS...................................................................................................................... 4-3

Figure 4-3 SYSTEM : Password ................................................................................................................. 4-4

Figure 4-4 SYSTEM : Time Setting ............................................................................................................ 4-5

Figure 5-1 Any IP Example Application...................................................................................................... 5-3

Figure 5-2 LAN : IP .................................................................................................................................... 5-4

Figure 5-3 LAN : Static DHCP ................................................................................................................... 5-6

Figure 5-4 LAN : IP Alias ........................................................................................................................... 5-7

Figure 6-1 IBSS (Ad-hoc) Wireless LAN ................................................................................................... 6-1

Figure 6-2 Basic Service set ........................................................................................................................ 6-2

Figure 6-3 Extended Service Set ................................................................................................................. 6-2

Figure 6-4 RTS/CTS.................................................................................................................................... 6-3

Figure 6-5 WLAN : Wireless....................................................................................................................... 6-4

Figure 6-6 Roaming Example...................................................................................................................... 6-6

Figure 6-7 WLAN : Roaming...................................................................................................................... 6-7

Figure 7-1 HomeSafe Wireless Security Levels .......................................................................................... 7-1

Figure 7-2 WLAN : Wireless : No Security ................................................................................................ 7-2

Figure 7-3 WEP Authentication Steps ......................................................................................................... 7-4

Figure 7-4 WLAN : Wireless : Static WEP Encryption............................................................................... 7-5

Figure 7-5 WPA - PSK Authentication........................................................................................................ 7-7

Figure 7-6 WLAN : Wireless : WPA-PSK................................................................................................... 7-8

Figure 7-7 WPA with RADIUS Application Example............................................................................... 7-10

Figure 7-8 Wireless: WPA ......................................................................................................................... 7-10

Figure 7-9 WLAN : Wireless : 802.1x and Dynamic WEP ....................................................................... 7-12

Figure 7-10 WLAN : Wireless : 802.1x and Static WEP........................................................................... 7-14

Figure 7-11 WLAN : Wireless: 802.1x...................................................................................................... 7-16

Figure 7-12 WLAN : MAC Address Filter................................................................................................ 7-18

Figure 7-13 WLAN : Local User Database ............................................................................................... 7-19

Figure 7-14 EAP Authentication ............................................................................................................... 7-21

Figure 7-15 WLAN : RADIUS ................................................................................................................. 7-22

Figure 8-1 WAN : Route.............................................................................................................................. 8-1

Figure 8-2 WAN ISP : Ethernet Encapsulation........................................................................................... 8-2

Figure 8-3 WAN ISP : PPPoE Encapsulation .............................................................................................. 8-4

Figure 8-4 WAN ISP : PPTP Encapsulation ................................................................................................ 8-5

Figure 8-5 WAN : IP.................................................................................................................................... 8-6

Figure 8-6 WAN : MAC Setup .................................................................................................................... 8-8

Figure 8-7 Traffic Redirect WAN Setup ...................................................................................................... 8-9

Figure 8-8 Traffic Redirect LAN Setup....................................................................................................... 8-9

Figure 8-9 WAN : Traffic Redirect ............................................................................................................ 8-10

Figure 9-1 How NAT Works........................................................................................................................ 9-2

Figure 9-2 NAT Application With IP Alias.................................................................................................. 9-3

Figure 9-3 Multiple Servers Behind NAT Example .................................................................................... 9-6

Figure 9-4 SUA/NAT Setup ........................................................................................................................ 9-7

Figure 9-5 Address Mapping ....................................................................................................................... 9-8

Figure 9-6 Address Mapping Edit ............................................................................................................... 9-9