Table of Contents
Scenario 1 —Connecting your USG to the Internet ................................................................................................................................................................................... 4
1.1 Application Scenario ....................................................................................................................................................................................................................... 4
1.2 Configuration Guide ....................................................................................................................................................................................................................... 5
Scenario 2 —WAN Load Balancing and Customized Usage of WAN Connection for Specific Traffic....................................................................................................12
2.1 WAN Load Balancing.....................................................................................................................................................................................................................12
2.1.1 Load Balancing Algorithm ......................................................................................................................................................................................................... 12
2.2 Customized Usage of WAN Connection for Specific Traffic Type...............................................................................................................................................14
2.3 Application Scenario ..................................................................................................................................................................................................................... 15
2.4 Configuration Guide .....................................................................................................................................................................................................................16
Scenario 3 —How to configure NAT if you have Internet-facing public servers ....................................................................................................................................22
3.1 Application Scenario ..................................................................................................................................................................................................................... 22
3.2 Configuration Guide .....................................................................................................................................................................................................................23
Scenario 4 —Secure site-to-site connections using IPSec VPN ............................................................................................................................................................... 27
4.1 Application Scenario ..................................................................................................................................................................................................................... 27
4.2 Configuration Guide .....................................................................................................................................................................................................................28
Scenario 5 —Secure client-to-site connections using IPSec VPN............................................................................................................................................................ 35
5.1 Application Scenario ..................................................................................................................................................................................................................... 35
5.2 Configuration Guide .....................................................................................................................................................................................................................36
Scenario 6 —Deploying SSL VPN for Tele-workers to Access Company Resources ............................................................................................................................... 45
6.1 Application Scenario ..................................................................................................................................................................................................................... 45
6.2 Configuration Guide .....................................................................................................................................................................................................................46
Scenario 7 —Reserving Highest Bandwidth Management Priority for VoIP Traffic...............................................................................................................................55
7.1 Application Scenario ..................................................................................................................................................................................................................... 55
7.2 Configuration Guide .....................................................................................................................................................................................................................56
Step4. Create a bandwidth management rule and configure..........................................................................................................................................................60