ZyWALL 5/35/70 Series User’s Guide

Figure 39 WLAN Port Role Example ..................................................................................

118

Figure 40 LAN Port Roles ...................................................................................................

119

Figure 41 Port Roles Change Complete .............................................................................

120

Figure 42 Bridge Loop: Bridge Connected to Wired LAN ...................................................

122

Figure 43 Bridge ..................................................................................................................

125

Figure 44 WLAN Port Role Example ..................................................................................

127

Figure 45 Bridge Port Roles ................................................................................................

127

Figure 46 Port Roles Change Complete .............................................................................

128

Figure 47 Least Load First Example ..................................................................................

132

Figure 48 Weighted Round Robin Algorithm Example ........................................................

133

Figure 49 Spillover Algorithm Example ...............................................................................

134

Figure 50 WAN General ......................................................................................................

135

Figure 51 Load Balancing: Least Load First .......................................................................

138

Figure 52 Load Balancing: Weighted Round Robin ............................................................

139

Figure 53 Load Balancing: Spillover ....................................................................................

140

Figure 54 WAN Route .........................................................................................................

141

Figure 55 WAN: Ethernet Encapsulation .............................................................................

144

Figure 56 WAN: PPPoE Encapsulation ...............................................................................

147

Figure 57 WAN: PPTP Encapsulation .................................................................................

150

Figure 58 Traffic Redirect WAN Setup ................................................................................

153

Figure 59 Traffic Redirect LAN Setup .................................................................................

154

Figure 60 Traffic Redirect ....................................................................................................

154

Figure 61 Dial Backup .........................................................................................................

156

Figure 62 Advanced Setup ..................................................................................................

160

Figure 63 DMZ ....................................................................................................................

163

Figure 64 DMZ Static DHCP ...............................................................................................

166

Figure 65 DMZ: IP Alias ......................................................................................................

167

Figure 66 DMZ Public Address Example ............................................................................

169

Figure 67 DMZ Private and Public Address Example .........................................................

170

Figure 68 WLAN Port Role Example ..................................................................................

171

Figure 69 DMZ: Port Roles .................................................................................................

172

Figure 70 WLAN ..................................................................................................................

175

Figure 71 WLAN Static DHCP .............................................................................................

178

Figure 72 WLAN IP Alias ....................................................................................................

179

Figure 73 WLAN Port Role Example ..................................................................................

180

Figure 74 WLAN Port Roles ................................................................................................

181

Figure 75 WLAN Port Roles Change Complete ..................................................................

182

Figure 76 ZyWALL Wireless Security Levels ......................................................................

183

Figure 77 EAP Authentication .............................................................................................

186

Figure 78 WPA-PSK Authentication ....................................................................................

189

Figure 79 WPA with RADIUS Application Example ............................................................

190

Figure 80 Wireless Card: No Security .................................................................................

191

Figure 81 Wireless Card: Static WEP .................................................................................

193

33

List of Figures