Diagram 2-1 Ideal Setup ................................................................................................................................ | 2-1 |
Diagram 2-2 “Triangle Route” Problem ........................................................................................................ | 2-2 |
Diagram 2-3 IP Alias...................................................................................................................................... | 2-2 |
Diagram 2-4 Gateways on the WAN Side...................................................................................................... | 2-3 |
Diagram 3-1 Big Picture— Filtering, Firewall, VPN and NAT ..................................................................... | 3-1 |
Diagram 4-1 Peer-to-Peer Communication in an Ad-hoc Network................................................................ | 4-3 |
Diagram 4-2 ESS Provides Campus-Wide Coverage..................................................................................... | 4-4 |
Diagram 5-1 Sequences for EAP MD5–Challenge Authentication................................................................ | 5-2 |
Diagram 6-1 Single-PC per Modem Hardware Configuration....................................................................... | 6-1 |
Diagram 6-2 ZyWALL as a PPPoE Client ..................................................................................................... | 6-2 |
Diagram 7-1 Transport PPP frames over Ethernet ......................................................................................... | 7-1 |
Diagram 7-2 PPTP Protocol Overview .......................................................................................................... | 7-2 |
Diagram 7-3 Example Message Exchange between PC and an ANT ............................................................ | 7-3 |
Diagram 11-1 NetBIOS Display Filter Settings Command Without DMZ Example.................................... | 11-2 |
Diagram 11-2 NetBIOS Display Filter Settings Command With DMZ Example......................................... | 11-2 |
Diagram 12-1 Option to Enter Debug Mode................................................................................................ | 12-1 |
Diagram 12-2 Boot Module Commands ...................................................................................................... | 12-2 |
Diagram 13-1 Example VPN Initiator IPSec Log...................................................................................... | 13-12 |
Diagram 13-2 Example VPN Responder IPSec Log.................................................................................. | 13-12 |