List of Figures
Figure 82 SECURITY > CONTENT FILTER > Policy > External Database (Default)
.......................... 135
Figure 83 HOME > DHCP Table ...........................................................................................................
136
Figure 84 SECURITY > CONTENT FILTER > Policy ...........................................................................
Figure 85 SECURITY > CONTENT FILTER > Policy > Insert ..............................................................
137
Figure 86 SECURITY > CONTENT FILTER > Policy ...........................................................................
Figure 87 SECURITY > CONTENT FILTER > Policy > Schedule (Bob) ..............................................
138
Figure 88 SECURITY > CONTENT FILTER > Policy ...........................................................................
139
Figure 89 SECURITY > CONTENT FILTER > Policy > External Database (Bob) ...............................
Figure 90 REGISTRATION ...................................................................................................................
142
Figure 91 REGISTRATION: Registered Device ...................................................................................
143
Figure 92 REGISTRATION > Service ...................................................................................................
144
Figure 93 LAN and WAN .....................................................................................................................
147
Figure 94 NETWORK > LAN ................................................................................................................
151
Figure 95 NETWORK > LAN > Static DHCP ........................................................................................
154
Figure 96 Physical Network & Partitioned Logical Networks ................................................................
155
Figure 97 NETWORK > LAN > IP Alias ................................................................................................
Figure 98 NETWORK > LAN > Port Roles ...........................................................................................
157
Figure 99 Port Roles Change Complete ...............................................................................................
Figure 100 Bridge Loop: Bridge Connected to Wired LAN ...................................................................
159
Figure 101 NETWORK > Bridge ...........................................................................................................
162
Figure 102 NETWORK > Bridge > Port Roles ......................................................................................
164
Figure 103 Port Roles Change Complete .............................................................................................
Figure 104 Least Load First Example ..................................................................................................
167
Figure 105 Weighted Round Robin Algorithm Example .......................................................................
168
Figure 106 Spillover Algorithm Example ...............................................................................................
Figure 107 Different WAN IP Addresses .............................................................................................
169
Figure 108 NETWORK > WAN General ..............................................................................................
171
Figure 109 Load Balancing: Least Load First .......................................................................................
174
Figure 110 Load Balancing: Weighted Round Robin ............................................................................
175
Figure 111 Load Balancing: Spillover ....................................................................................................
176
Figure 112 NETWORK > WAN > WAN 1 (Ethernet Encapsulation) ..................................................
179
Figure 113 NETWORK > WAN > WAN 1 (PPPoE Encapsulation) ......................................................
182
Figure 114 NETWORK > WAN > WAN 1 (PPTP Encapsulation) ........................................................
185
Figure 115 NETWORK > WAN > WAN 2 (3G WAN) .........................................................................
190
Figure 116 Traffic Redirect WAN Setup ................................................................................................
193
Figure 117 Traffic Redirect LAN Setup .................................................................................................
194
Figure 118 NETWORK > WAN > Traffic Redirect .................................................................................
Figure 119 NETWORK > WAN > Dial Backup ....................................................................................
195
Figure 120 NETWORK > WAN > Dial Backup > Edit .........................................................................
198
Figure 121 NETWORK > DMZ ............................................................................................................
202
Figure 122 NETWORK > DMZ > Static DHCP ...................................................................................
205
Figure 123 NETWORK > DMZ > IP Alias ............................................................................................
206
Figure 124 DMZ Public Address Example ............................................................................................
208
ZyWALL 2WG User’s Guide
31