ZyXEL Communications 2WE Network Card User Manual


 
ZyWALL 2 and ZyWALL 2WE
Getting to Know Your ZyWALL 1-5
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) allows the individual client computers to obtain the TCP/IP
configuration at start-up from a centralized DHCP server. The ZyWALL has built-in DHCP server
capability, enabled by default, which means it can assign IP addresses, an IP default gateway and DNS
servers to all systems that support the DHCP client. The ZyWALL can also act as a surrogate DHCP server
(DHCP Relay) where it relays IP address assignment from another DHCP server to the clients.
Full Network Management
The embedded web configurator is an all-platform web-based utility that allows you to easily access the
ZyWALL’s management settings and configure the firewall. The ZyWALL also provides the SMT (System
Management Terminal) interface. The SMT is a menu-driven interface that you can access from a terminal
emulator through the console port or over a telnet connection.
RoadRunner Support
In addition to standard cable modem services, the ZyWALL supports Time Warner’s RoadRunner Service.
Logging and Tracing
Built-in message logging and packet tracing.
Unix syslog facility support.
Firewall logs.
Content filtering logs.
Upgrade ZyWALL Firmware
The firmware of the ZyWALL can be upgraded via the console port or the LAN.
Embedded FTP and TFTP Servers
The ZyWALL’s embedded FTP and TFTP Servers enable fast firmware upgrades as well as configuration
file backups and restoration.
1.3 Applications for the ZyWALL
1.3.1 Secure Broadband Internet Access and VPN
You can connect a cable, DSL or wireless modem to the ZyWALL via Ethernet for broadband Internet
access. The ZyWALL also provides IP address sharing and a firewall-protected local network with traffic
management.
ZyWALL VPN is an ideal cost-effective way to connect branch offices and business partners over the
Internet without the need (and expense) of leased lines between sites. Two of the LAN computers can use
VPN tunnels for secure connections to remote computers.