ZyXEL Communications Parental Control Gateway HS100/HS100W User Manual
Page 14

HomeSafe User’s Guide
xiv
List of Figures
Figure 4-2 SYSTEM : DDNS...................................................................................................................... 4-3
Figure 4-3 SYSTEM : Password ................................................................................................................. 4-4
Figure 4-4 SYSTEM : Time Setting ............................................................................................................ 4-5
Figure 5-1 Any IP Example Application...................................................................................................... 5-3
Figure 5-2 LAN : IP .................................................................................................................................... 5-4
Figure 5-3 LAN : Static DHCP ................................................................................................................... 5-6
Figure 5-4 LAN : IP Alias ........................................................................................................................... 5-7
Figure 6-1 IBSS (Ad-hoc) Wireless LAN ................................................................................................... 6-1
Figure 6-2 Basic Service set ........................................................................................................................ 6-2
Figure 6-3 Extended Service Set ................................................................................................................. 6-2
Figure 6-4 RTS/CTS.................................................................................................................................... 6-3
Figure 6-5 WLAN : Wireless....................................................................................................................... 6-4
Figure 6-6 Roaming Example...................................................................................................................... 6-6
Figure 6-7 WLAN : Roaming...................................................................................................................... 6-7
Figure 7-1 HomeSafe Wireless Security Levels .......................................................................................... 7-1
Figure 7-2 WLAN : Wireless : No Security ................................................................................................ 7-2
Figure 7-3 WEP Authentication Steps ......................................................................................................... 7-4
Figure 7-4 WLAN : Wireless : Static WEP Encryption............................................................................... 7-5
Figure 7-5 WPA - PSK Authentication........................................................................................................ 7-7
Figure 7-6 WLAN : Wireless : WPA-PSK................................................................................................... 7-8
Figure 7-7 WPA with RADIUS Application Example............................................................................... 7-10
Figure 7-8 Wireless: WPA ......................................................................................................................... 7-10
Figure 7-9 WLAN : Wireless : 802.1x and Dynamic WEP ....................................................................... 7-12
Figure 7-10 WLAN : Wireless : 802.1x and Static WEP........................................................................... 7-14
Figure 7-11 WLAN : Wireless: 802.1x...................................................................................................... 7-16
Figure 7-12 WLAN : MAC Address Filter................................................................................................ 7-18
Figure 7-13 WLAN : Local User Database ............................................................................................... 7-19
Figure 7-14 EAP Authentication ............................................................................................................... 7-21
Figure 7-15 WLAN : RADIUS ................................................................................................................. 7-22
Figure 8-1 WAN : Route.............................................................................................................................. 8-1
Figure 8-2 WAN ISP : Ethernet Encapsulation........................................................................................... 8-2
Figure 8-3 WAN ISP : PPPoE Encapsulation .............................................................................................. 8-4
Figure 8-4 WAN ISP : PPTP Encapsulation ................................................................................................ 8-5
Figure 8-5 WAN : IP.................................................................................................................................... 8-6
Figure 8-6 WAN : MAC Setup .................................................................................................................... 8-8
Figure 8-7 Traffic Redirect WAN Setup ...................................................................................................... 8-9
Figure 8-8 Traffic Redirect LAN Setup....................................................................................................... 8-9
Figure 8-9 WAN : Traffic Redirect ............................................................................................................ 8-10
Figure 9-1 How NAT Works........................................................................................................................ 9-2
Figure 9-2 NAT Application With IP Alias.................................................................................................. 9-3
Figure 9-3 Multiple Servers Behind NAT Example .................................................................................... 9-6
Figure 9-4 SUA/NAT Setup ........................................................................................................................ 9-7
Figure 9-5 Address Mapping ....................................................................................................................... 9-8
Figure 9-6 Address Mapping Edit ............................................................................................................... 9-9