
ZyWALL 5/35/70 Series User’s Guide
42 List of Figures
Figure 468 Macintosh OS 8/9: Apple Menu ........................................................................ 738
Figure 469 Macintosh OS 8/9: TCP/IP ................................................................................ 738
Figure 470 Macintosh OS X: Apple Menu ........................................................................... 739
Figure 471 Macintosh OS X: Network ................................................................................. 740
Figure 472 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 741
Figure 473 Red Hat 9.0: KDE: Ethernet Device: General ................................................. 741
Figure 474 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 742
Figure 475 Red Hat 9.0: KDE: Network Configuration: Activate ....................................... 742
Figure 476 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. 743
Figure 477 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. 743
Figure 478 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... 743
Figure 479 Red Hat 9.0: Restart Ethernet Card ................................................................ 744
Figure 480 Red Hat 9.0: Checking TCP/IP Properties ...................................................... 744
Figure 481 Peer-to-Peer Communication in an Ad-hoc Network ........................................ 757
Figure 482 Basic Service Set .............................................................................................. 758
Figure 483 Infrastructure WLAN ......................................................................................... 759
Figure 484 RTS/CTS ........................................................................................................... 760
Figure 485 EAP Authentication ........................................................................................... 763
Figure 486 WEP Authentication Steps ................................................................................ 766
Figure 487 Roaming Example ............................................................................................. 769
Figure 488 Windows 98 SE: WinPopup ............................................................................ 771
Figure 489 WIndows 98 SE: Program Task Bar ................................................................ 771
Figure 490 Windows 98 SE: Task Bar Properties .......................................................... 772
Figure 491 Windows 98 SE: StartUp ................................................................................. 772
Figure 492 Windows 98 SE: Startup: Create Shortcut ..................................................... 773
Figure 493 Windows 98 SE: Startup: Select a Title for the Program ................................ 773
Figure 494 Windows 98 SE: Startup: Shortcut .................................................................. 774
Figure 495 VPN Rules ........................................................................................................ 776
Figure 496 Headquarters Gateway Policy Edit ................................................................... 777
Figure 497 Branch Office Gateway Policy Edit ................................................................... 778
Figure 498 Headquarters VPN Rule ................................................................................... 779
Figure 499 Branch Office VPN Rule ................................................................................... 779
Figure 500 Headquarters Network Policy Edit .................................................................... 780
Figure 501 Branch Office Network Policy Edit .................................................................... 781
Figure 502 VPN Rule Configured ........................................................................................ 782
Figure 503 VPN Dial ........................................................................................................... 782
Figure 504 VPN Tunnel Established ................................................................................... 782
Figure 505 VPN Log Example ............................................................................................ 784
Figure 506 IKE/IPSec Debug Example .............................................................................. 785
Figure 507 Security Certificate ............................................................................................ 787
Figure 508 Login Screen ..................................................................................................... 788
Figure 509 Certificate General Information before Import ................................................... 788
Figure 510 Certificate Import Wizard 1 ............................................................................... 789
Comentarios a estos manuales