Dil ID: 11
Dil Adı: russia
Dil Kodu: ru5
Dünyanın En Büyük
Elektronik Bilgi Kütüphanesi



ZyWALL 2 Plus User’s Guide
Table of Contents 13
6.1.1 Bridge Loop ............................................................................................103
6.2 Spanning Tree Protocol (STP) .........................................................................104
6.2.1 Rapid STP ..............................................................................................104
6.2.2 STP Terminology ....................................................................................104
6.2.3 How STP Works .....................................................................................105
6.2.4 STP Port States ......................................................................................105
6.3 Configuring Bridge ...........................................................................................105
Chapter 7
WAN Screens........................................................................................................ 109
7.1 WAN Overview .................................................................................................109
7.2 TCP/IP Priority (Metric) ....................................................................................109
7.3 WAN Route ......................................................................................................109
7.4 WAN IP Address Assignment ........................................................................... 111
7.5 DNS Server Address Assignment .................................................................... 111
7.6 WAN MAC Address ..........................................................................................112
7.7 WAN .................................................................................................................112
7.7.1 WAN Ethernet Encapsulation .................................................................112
7.7.2 PPPoE Encapsulation .............................................................................115
7.7.3 PPTP Encapsulation ...............................................................................119
7.8 Traffic Redirect .................................................................................................122
7.9 Configuring Traffic Redirect ..............................................................................122
7.10 Configuring Dial Backup .................................................................................123
7.11 Advanced Modem Setup ................................................................................127
7.11.1 AT Command Strings ............................................................................127
7.11.2 DTR Signal ............................................................................................127
7.11.3 Response Strings ..................................................................................127
7.12 Configuring Advanced Modem Setup ............................................................127
Chapter 8
Firewall Screens................................................................................................... 131
8.1 Firewall Overview .............................................................................................131
8.2 Firewall Connection Directions .........................................................................132
8.3 Security Considerations ...................................................................................133
8.4 Firewall Rules Example ....................................................................................133
8.5 Firewall Default Rule (Router Mode) ................................................................135
8.6 Firewall Default Rule (Bridge Mode) ..............................................................136
8.7 Firewall Rule Summary ...................................................................................138
8.7.1 Firewall Edit Rule ................................................................................139
8.8 Anti-Probing .................................................................................................142
8.9 Denial of Service Attacks .................................................................................143
8.10 Firewall Thresholds .....................................................................................144
8.10.1 Threshold Values ..................................................................................144