ZyWALL 2 Series User’s Guide

 

List of Figures

Figure 1-1 Secure Internet Access via Cable, DSL or Wireless Modem........................................................

1-6

Figure 1-2 Secure Internet Access and VPN Application...............................................................................

1-7

Figure 2-1 Change Password Screen..............................................................................................................

2-1

Figure 2-2 Replace Certificate Screen ...........................................................................................................

2-2

Figure 2-3 Example Xmodem Upload ...........................................................................................................

2-3

Figure 2-4 The MAIN MENU Screen of the Web Configurator....................................................................

2-4

Figure 3-1 Wizard 1 .......................................................................................................................................

3-2

Figure 3-2 Wizard 2: Ethernet Encapsulation

................................................................................................

3-3

Figure 3-3 Wizard2: PPPoE Encapsulation....................................................................................................

3-5

Figure 3-4 Wizard 2: PPTP Encapsulation.....................................................................................................

3-7

Figure 3-5 Wizard 3 ......................................................................................................................................

3-11

Figure 3-6 Internet Access Wizard Setup Complete ....................................................................................

3-13

Figure 4-1 System General Setup ..................................................................................................................

4-1

Figure 4-2 DDNS...........................................................................................................................................

4-4

Figure 4-3 Password.......................................................................................................................................

4-6

Figure 4-4 Time Setting .................................................................................................................................

4-8

Figure 5-1 IP ..................................................................................................................................................

5-4

Figure 5-2 Static DHCP .................................................................................................................................

5-7

Figure 5-3 Physical Network

Figure 5-4 Partitioned Logical Networks...............................

5-8

Figure 5-5 IP Alias .........................................................................................................................................

5-8

Figure 6-1 WAN Setup: Route.........................................................................................................................

6-3

Figure 6-2 Ethernet Encapsulation.................................................................................................................

6-4

Figure 6-3 PPPoE Encapsulation ...................................................................................................................

6-6

Figure 6-4 PPTP Encapsulation .....................................................................................................................

6-8

Figure 6-5 IP Setup ......................................................................................................................................

6-10

Figure 6-6 MAC Setup.................................................................................................................................

6-13

Figure 6-7 Traffic Redirect Setup Example .................................................................................................

6-14

Figure 6-8 Traffic Redirect LAN Setup .......................................................................................................

6-15

Figure 6-9 Traffic Redirect...........................................................................................................................

6-16

Figure 6-10 Dial Backup Setup ......................................................................................................................

6-18

Figure 6-11 Advanced Setup ..........................................................................................................................

6-24

Figure 7-1 RTS Threshold..............................................................................................................................

7-2

Figure 7-2 ZyWALL Wireless Security Levels ..............................................................................................

7-3

Figure 7-3 Wireless ........................................................................................................................................

7-4

Figure 7-4 MAC Address Filter .....................................................................................................................

7-6

Figure 7-5 EAP Authentication ......................................................................................................................

7-9

Figure 7-6 802.1X Authentication................................................................................................................

7-10

Figure 8-1 How NAT Works ..........................................................................................................................

8-2

Figure 8-2 NAT Application With IP Alias ....................................................................................................

8-3

List of Figures

xv