This chapter describes factors and configurations related to network connection, including:
Security Zone: The security zone divides the network into different section, such as the trust zone and the untrust zone. The device can control the traffic flow from and to security zones once the configured policy rules have been applied.
- Interface: The interface allows inbound and outbound traffic flow to security zones. An interface must be bound to a security zone so that traffic can flow into and from the security zone.
- MGT Interface: To facilitate the management of the device and meet the requirement of separating the management traffic from the data traffic, system has an independent management interface(MGT Interface).
VLAN: Virtual LAN.
DNS: Domain Name System.
- DHCP: Dynamic Host Configuration Protocol.
DDNS: Dynamic Domain Name Server.
- PPPoE: Point-to-Point Protocol over Ethernet.
Virtual-Wire: The virtual wire allows direct Layer 2 communications between sub networks.
Virtual Router: Virtual Routerouter (Virtual Router for short) acts as a router. Different Virtual Routers have their own independent routing tables.
Virtual Switch: Running on Layer 2, VSwitch acts as a switch. Once a Layer 2 security zone is bound to a VSwitch, all the interfaces bound to that zone will also be bound to the VSwitch.
- Port Mirroring: Allow users to mirror the traffic of one interface to another interface (analytic interface) for analysis and monitoring.
- Link Load Balancing: It takes advantage of dynamic link detection technique to assign traffic to different links appropriately, thus making full use of all available link resources.
- Application Layer Gate: ALG can assure the data transmission for the applications that use multiple channels and assure the proper operation of VoIP applications in the strictest NAT mode.
- Global Network Parameters: These parameters mainly include the IP packet's processing options, like IP fragmentation, TCP MSS value, etc.