
ZyWALL 5/35/70 Series User’s Guide
32 List of Figures
Figure 39 Firewall Rule for VPN .......................................................................................... 115
Figure 40 SECURITY > VPN > VPN Rules (IKE) .............................................................. 115
Figure 41 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy ......................... 116
Figure 42 SECURITY > VPN > VPN Rules (IKE): With Gateway Policy Example ............ 117
Figure 43 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy ........................... 118
Figure 44 SECURITY > FIREWALL > Rule Summary ........................................................ 119
Figure 45 SECURITY > FIREWALL > Rule Summary > Edit: Allow .................................. 120
Figure 46 SECURITY > FIREWALL > Rule Summary: Allow ............................................. 121
Figure 47 SECURITY > FIREWALL > Default Rule: Block From VPN To LAN ................... 121
Figure 48 REGISTRATION ................................................................................................. 124
Figure 49 REGISTRATION: Registered Device .................................................................. 126
Figure 50 REGISTRATION > Service ................................................................................. 126
Figure 51 LAN and WAN .................................................................................................... 129
Figure 52 NETWORK > LAN .............................................................................................. 133
Figure 53 NETWORK > LAN > Static DHCP ...................................................................... 136
Figure 54 Physical Network & Partitioned Logical Networks .............................................. 137
Figure 55 NETWORK > LAN > IP Alias .............................................................................. 138
Figure 56 NETWORK > LAN > Port Roles .......................................................................... 140
Figure 57 Port Roles Change Complete ............................................................................. 140
Figure 58 Bridge Loop: Bridge Connected to Wired LAN ................................................... 141
Figure 59 NETWORK > Bridge ........................................................................................... 144
Figure 60 NETWORK > Bridge > Port Roles ...................................................................... 146
Figure 61 Port Roles Change Complete ............................................................................. 146
Figure 62 Least Load First Example .................................................................................. 149
Figure 63 Weighted Round Robin Algorithm Example ........................................................ 150
Figure 64 Spillover Algorithm Example ............................................................................... 151
Figure 65 NETWORK > WAN (General) ............................................................................ 152
Figure 66 Load Balancing: Least Load First ....................................................................... 155
Figure 67 Load Balancing: Weighted Round Robin ............................................................ 156
Figure 68 Load Balancing: Spillover .................................................................................... 157
Figure 69 NETWORK > WAN (Route) ................................................................................ 158
Figure 70 NETWORK > WAN > WAN (Ethernet Encapsulation) ..................................... 161
Figure 71 NETWORK > WAN > WAN (PPPoE Encapsulation) ......................................... 164
Figure 72 NETWORK > WAN > WAN (PPTP Encapsulation) ............................................ 167
Figure 73 Traffic Redirect WAN Setup ................................................................................ 170
Figure 74 Traffic Redirect LAN Setup ................................................................................. 170
Figure 75 NETWORK > WAN > Traffic Redirect ................................................................. 171
Figure 76 NETWORK > WAN > Dial Backup .................................................................... 172
Figure 77 NETWORK > WAN > Dial Backup > Edit .......................................................... 176
Figure 78 NETWORK > DMZ ............................................................................................. 180
Figure 79 NETWORK > DMZ > Static DHCP .................................................................... 183
Figure 80 NETWORK > DMZ > IP Alias ............................................................................ 184
Figure 81 DMZ Public Address Example ............................................................................ 186
Comentários a estes Manuais