List of Figures

Figure 82 SECURITY > CONTENT FILTER > Policy ...........................................................................

123

Figure 83 SECURITY > CONTENT FILTER > Policy > Insert ..............................................................

124

Figure 84 SECURITY > CONTENT FILTER > Policy ...........................................................................

124

Figure 85 SECURITY > CONTENT FILTER > Policy > Schedule (Bob) ..............................................

125

Figure 86 SECURITY > CONTENT FILTER > Policy ...........................................................................

125

Figure 87 SECURITY > CONTENT FILTER > Policy > External Database (Bob) ...............................

126

Figure 88 REGISTRATION ...................................................................................................................

128

Figure 89 REGISTRATION: Registered Device ...................................................................................

129

Figure 90 REGISTRATION > Service ...................................................................................................

130

Figure 91 LAN and WAN .....................................................................................................................

133

Figure 92 NETWORK > LAN ................................................................................................................

137

Figure 93 NETWORK > LAN > Static DHCP ........................................................................................

139

Figure 94 Physical Network & Partitioned Logical Networks ................................................................

140

Figure 95 NETWORK > LAN > IP Alias ................................................................................................

141

Figure 96 NETWORK > LAN > Port Roles ...........................................................................................

142

Figure 97 Port Roles Change Complete ...............................................................................................

143

Figure 98 Bridge Loop: Bridge Connected to Wired LAN .....................................................................

145

Figure 99 NETWORK > Bridge .............................................................................................................

148

Figure 100 NETWORK > Bridge > Port Roles ......................................................................................

150

Figure 101 Port Roles Change Complete .............................................................................................

150

Figure 102 NETWORK > WAN Route .................................................................................................

152

Figure 103 NETWORK > WAN > WAN (Ethernet Encapsulation) .....................................................

155

Figure 104 NETWORK > WAN > WAN (PPPoE Encapsulation) .........................................................

158

Figure 105 NETWORK > WAN > WAN (PPTP Encapsulation) ...........................................................

161

Figure 106 Traffic Redirect WAN Setup ................................................................................................

164

Figure 107 Traffic Redirect LAN Setup .................................................................................................

164

Figure 108 NETWORK > WAN > Traffic Redirect ................................................................................

164

Figure 109 NETWORK > WAN > Dial Backup ...................................................................................

166

Figure 110 NETWORK > WAN > Dial Backup > Edit .........................................................................

169

Figure 111 NETWORK > DMZ .............................................................................................................

172

Figure 112 NETWORK > DMZ > Static DHCP ...................................................................................

174

Figure 113 NETWORK > DMZ > IP Alias ............................................................................................

176

Figure 114 DMZ Public Address Example ............................................................................................

177

Figure 115 DMZ Private and Public Address Example .........................................................................

178

Figure 116 NETWORK > DMZ > Port Roles .......................................................................................

179

Figure 117 NETWORK > WLAN ..........................................................................................................

182

Figure 118 NETWORK > WLAN > Static DHCP ..................................................................................

184

Figure 119 NETWORK > WLAN > IP Alias .........................................................................................

186

Figure 120 WLAN Port Role Example .................................................................................................

187

Figure 121 NETWORK > WLAN > Port Roles .....................................................................................

188

Figure 122 NETWORK > WLAN > Port Roles: Change Complete .......................................................

188

Figure 123 Default Firewall Action ........................................................................................................

191

Figure 124 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................

192

ZyWALL 2 Plus User’s Guide

29