ZyWALL 5/35/70 Series User’s Guide

Figure 39 WLAN Port Role Example ..................................................................................

114

Figure 40 LAN Port Roles ...................................................................................................

115

Figure 41 Port Roles Change Complete .............................................................................

116

Figure 42 Bridge Loop: Bridge Connected to Wired LAN ...................................................

118

Figure 43 Bridge ..................................................................................................................

121

Figure 44 WLAN Port Role Example ..................................................................................

123

Figure 45 Bridge Port Roles ................................................................................................

123

Figure 46 Port Roles Change Complete .............................................................................

124

Figure 47 Least Load First Example ..................................................................................

128

Figure 48 Weighted Round Robin Algorithm Example ........................................................

129

Figure 49 Spillover Algorithm Example ...............................................................................

130

Figure 50 WAN General ......................................................................................................

131

Figure 51 Load Balancing: Least Load First .......................................................................

134

Figure 52 Load Balancing: Weighted Round Robin ............................................................

135

Figure 53 Load Balancing: Spillover ....................................................................................

136

Figure 54 WAN Route .........................................................................................................

137

Figure 55 WAN: Ethernet Encapsulation .............................................................................

140

Figure 56 WAN: PPPoE Encapsulation ...............................................................................

143

Figure 57 WAN: PPTP Encapsulation .................................................................................

146

Figure 58 Traffic Redirect WAN Setup ................................................................................

149

Figure 59 Traffic Redirect LAN Setup .................................................................................

150

Figure 60 Traffic Redirect ....................................................................................................

150

Figure 61 Dial Backup .........................................................................................................

152

Figure 62 Advanced Setup ..................................................................................................

156

Figure 63 DMZ ....................................................................................................................

159

Figure 64 DMZ Static DHCP ...............................................................................................

162

Figure 65 DMZ: IP Alias ......................................................................................................

163

Figure 66 DMZ Public Address Example ............................................................................

165

Figure 67 DMZ Private and Public Address Example .........................................................

166

Figure 68 WLAN Port Role Example ..................................................................................

167

Figure 69 DMZ: Port Roles .................................................................................................

168

Figure 70 WLAN ..................................................................................................................

171

Figure 71 WLAN Static DHCP .............................................................................................

174

Figure 72 WLAN IP Alias ....................................................................................................

175

Figure 73 WLAN Port Role Example ..................................................................................

176

Figure 74 WLAN Port Roles ................................................................................................

177

Figure 75 WLAN Port Roles Change Complete ..................................................................

178

Figure 76 ZyWALL Wireless Security Levels ......................................................................

179

Figure 77 EAP Authentication .............................................................................................

182

Figure 78 WPA-PSK Authentication ....................................................................................

185

Figure 79 WPA with RADIUS Application Example ............................................................

186

Figure 80 Wireless Card: No Security .................................................................................

187

Figure 81 Wireless Card: Static WEP .................................................................................

189

29

List of Figures