ZyWALL 5/35/70 Series User’s Guide

 

7.4.2 Weighted Round Robin ...........................................................................

129

 

7.4.3 Spillover ..................................................................................................

129

7.5

TCP/IP Priority (Metric) ....................................................................................

130

7.7

Configuring Load Balancing .............................................................................

133

 

7.7.1 Least Load First ......................................................................................

134

 

7.7.2 Weighted Round Robin ...........................................................................

135

 

7.7.3 Spillover ..................................................................................................

135

7.9

WAN IP Address Assignment ...........................................................................

138

7.10 DNS Server Address Assignment ..................................................................

138

7.11 WAN MAC Address ........................................................................................

139

 

7.12.1 WAN Ethernet Encapsulation ...............................................................

139

 

7.12.2 PPPoE Encapsulation ...........................................................................

142

 

7.12.3 PPTP Encapsulation .............................................................................

146

7.14 Configuring Traffic Redirect ............................................................................

150

 

7.16.1 AT Command Strings ............................................................................

155

 

7.16.2 DTR Signal ...........................................................................................

155

 

7.16.3 Response Strings ..................................................................................

155

7.17 Configuring Advanced Modem Setup ............................................................

155

Chapter 8

 

 

DMZ Screens ........................................................................................................

158

8.2

Configuring DMZ ..............................................................................................

158

8.5

DMZ Public IP Address Example .....................................................................

164

8.6

DMZ Private and Public IP Address Example ..................................................

165

Chapter 9

 

 

Wireless LAN ........................................................................................................

170

9.1

Wireless LAN Introduction ................................................................................

170

 

9.1.1 Additional Installation Requirements for Using 802.1x ...........................

170

9.6

Wireless Security .............................................................................................

178

 

9.6.1 Encryption ...............................................................................................

179

 

9.6.2 Authentication .........................................................................................

179

 

9.6.3 Restricted Access ...................................................................................

180

 

9.6.4 Hide ZyWALL Identity .............................................................................

180

9.7

Security Parameters Summary ........................................................................

180

9.8

WEP Encryption ...............................................................................................

180

9.9

802.1x Overview ..............................................................................................

181

 

9.9.1 Introduction to RADIUS ..........................................................................

181

 

9.9.1.1 Types of RADIUS Messages .........................................................

181

 

9.9.2 EAP Authentication Overview .................................................................

182

9.10 Dynamic WEP Key Exchange ........................................................................

182

9.11 Introduction to WPA ........................................................................................

183

 

9.11.1 User Authentication ...............................................................................

183

Table of Contents

12