List of Figures
Figure 82 SECURITY > CONTENT FILTER > Policy ...........................................................................
123
Figure 83 SECURITY > CONTENT FILTER > Policy > Insert ..............................................................
124
Figure 84 SECURITY > CONTENT FILTER > Policy ...........................................................................
Figure 85 SECURITY > CONTENT FILTER > Policy > Schedule (Bob) ..............................................
125
Figure 86 SECURITY > CONTENT FILTER > Policy ...........................................................................
Figure 87 SECURITY > CONTENT FILTER > Policy > External Database (Bob) ...............................
126
Figure 88 REGISTRATION ...................................................................................................................
128
Figure 89 REGISTRATION: Registered Device ...................................................................................
129
Figure 90 REGISTRATION > Service ...................................................................................................
130
Figure 91 LAN and WAN .....................................................................................................................
133
Figure 92 NETWORK > LAN ................................................................................................................
137
Figure 93 NETWORK > LAN > Static DHCP ........................................................................................
139
Figure 94 Physical Network & Partitioned Logical Networks ................................................................
140
Figure 95 NETWORK > LAN > IP Alias ................................................................................................
141
Figure 96 NETWORK > LAN > Port Roles ...........................................................................................
142
Figure 97 Port Roles Change Complete ...............................................................................................
143
Figure 98 Bridge Loop: Bridge Connected to Wired LAN .....................................................................
145
Figure 99 NETWORK > Bridge .............................................................................................................
148
Figure 100 NETWORK > Bridge > Port Roles ......................................................................................
150
Figure 101 Port Roles Change Complete .............................................................................................
Figure 102 NETWORK > WAN Route .................................................................................................
152
Figure 103 NETWORK > WAN > WAN (Ethernet Encapsulation) .....................................................
155
Figure 104 NETWORK > WAN > WAN (PPPoE Encapsulation) .........................................................
158
Figure 105 NETWORK > WAN > WAN (PPTP Encapsulation) ...........................................................
161
Figure 106 Traffic Redirect WAN Setup ................................................................................................
164
Figure 107 Traffic Redirect LAN Setup .................................................................................................
Figure 108 NETWORK > WAN > Traffic Redirect ................................................................................
Figure 109 NETWORK > WAN > Dial Backup ...................................................................................
166
Figure 110 NETWORK > WAN > Dial Backup > Edit .........................................................................
169
Figure 111 NETWORK > DMZ .............................................................................................................
172
Figure 112 NETWORK > DMZ > Static DHCP ...................................................................................
174
Figure 113 NETWORK > DMZ > IP Alias ............................................................................................
176
Figure 114 DMZ Public Address Example ............................................................................................
177
Figure 115 DMZ Private and Public Address Example .........................................................................
178
Figure 116 NETWORK > DMZ > Port Roles .......................................................................................
179
Figure 117 NETWORK > WLAN ..........................................................................................................
182
Figure 118 NETWORK > WLAN > Static DHCP ..................................................................................
184
Figure 119 NETWORK > WLAN > IP Alias .........................................................................................
186
Figure 120 WLAN Port Role Example .................................................................................................
187
Figure 121 NETWORK > WLAN > Port Roles .....................................................................................
188
Figure 122 NETWORK > WLAN > Port Roles: Change Complete .......................................................
Figure 123 Default Firewall Action ........................................................................................................
191
Figure 124 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................
192
ZyWALL 2 Plus User’s Guide
29