List of Figures

Figure 82 SECURITY > CONTENT FILTER > Policy > External Database (Default)

.......................... 135

Figure 83 HOME > DHCP Table ...........................................................................................................

136

Figure 84 SECURITY > CONTENT FILTER > Policy ...........................................................................

136

Figure 85 SECURITY > CONTENT FILTER > Policy > Insert ..............................................................

137

Figure 86 SECURITY > CONTENT FILTER > Policy ...........................................................................

137

Figure 87 SECURITY > CONTENT FILTER > Policy > Schedule (Bob) ..............................................

138

Figure 88 SECURITY > CONTENT FILTER > Policy ...........................................................................

139

Figure 89 SECURITY > CONTENT FILTER > Policy > External Database (Bob) ...............................

139

Figure 90 REGISTRATION ...................................................................................................................

142

Figure 91 REGISTRATION: Registered Device ...................................................................................

143

Figure 92 REGISTRATION > Service ...................................................................................................

144

Figure 93 LAN and WAN .....................................................................................................................

147

Figure 94 NETWORK > LAN ................................................................................................................

151

Figure 95 NETWORK > LAN > Static DHCP ........................................................................................

154

Figure 96 Physical Network & Partitioned Logical Networks ................................................................

155

Figure 97 NETWORK > LAN > IP Alias ................................................................................................

155

Figure 98 NETWORK > LAN > Port Roles ...........................................................................................

157

Figure 99 Port Roles Change Complete ...............................................................................................

157

Figure 100 Bridge Loop: Bridge Connected to Wired LAN ...................................................................

159

Figure 101 NETWORK > Bridge ...........................................................................................................

162

Figure 102 NETWORK > Bridge > Port Roles ......................................................................................

164

Figure 103 Port Roles Change Complete .............................................................................................

164

Figure 104 Least Load First Example ..................................................................................................

167

Figure 105 Weighted Round Robin Algorithm Example .......................................................................

168

Figure 106 Spillover Algorithm Example ...............................................................................................

168

Figure 107 Different WAN IP Addresses .............................................................................................

169

Figure 108 NETWORK > WAN General ..............................................................................................

171

Figure 109 Load Balancing: Least Load First .......................................................................................

174

Figure 110 Load Balancing: Weighted Round Robin ............................................................................

175

Figure 111 Load Balancing: Spillover ....................................................................................................

176

Figure 112 NETWORK > WAN > WAN 1 (Ethernet Encapsulation) ..................................................

179

Figure 113 NETWORK > WAN > WAN 1 (PPPoE Encapsulation) ......................................................

182

Figure 114 NETWORK > WAN > WAN 1 (PPTP Encapsulation) ........................................................

185

Figure 115 NETWORK > WAN > WAN 2 (3G WAN) .........................................................................

190

Figure 116 Traffic Redirect WAN Setup ................................................................................................

193

Figure 117 Traffic Redirect LAN Setup .................................................................................................

194

Figure 118 NETWORK > WAN > Traffic Redirect .................................................................................

194

Figure 119 NETWORK > WAN > Dial Backup ....................................................................................

195

Figure 120 NETWORK > WAN > Dial Backup > Edit .........................................................................

198

Figure 121 NETWORK > DMZ ............................................................................................................

202

Figure 122 NETWORK > DMZ > Static DHCP ...................................................................................

205

Figure 123 NETWORK > DMZ > IP Alias ............................................................................................

206

Figure 124 DMZ Public Address Example ............................................................................................

208

ZyWALL 2WG User’s Guide

31