Table of Contents
Scenario 1 — Connecting your USG to the Internet ................................................................................................................................................................................... 4
1.1 Application Scenario ....................................................................................................................................................................................................................... 4
1.2 Configuration Guide ....................................................................................................................................................................................................................... 5
Scenario 2 — WAN Load Balancing and Customized Usage of WAN Connection for Specific Traffic .................................................................................................... 12
2.1 WAN Load Balancing..................................................................................................................................................................................................................... 12
2.1.1 Load Balancing Algorithm ......................................................................................................................................................................................................... 12
2.2 Customized Usage of WAN Connection for Specific Traffic Type............................................................................................................................................... 14
2.3 Application Scenario ..................................................................................................................................................................................................................... 15
2.4 Configuration Guide ..................................................................................................................................................................................................................... 16
Scenario 3 — How to configure NAT if you have Internet-facing public servers .................................................................................................................................... 22
3.1 Application Scenario ..................................................................................................................................................................................................................... 22
3.2 Configuration Guide ..................................................................................................................................................................................................................... 23
Scenario 4 — Secure site-to-site connections using IPSec VPN ............................................................................................................................................................... 27
4.1 Application Scenario ..................................................................................................................................................................................................................... 27
4.2 Configuration Guide ..................................................................................................................................................................................................................... 28
Scenario 5 — Secure client-to-site connections using IPSec VPN ............................................................................................................................................................ 35
5.1 Application Scenario ..................................................................................................................................................................................................................... 35
5.2 Configuration Guide ..................................................................................................................................................................................................................... 36
Scenario 6 — Deploying SSL VPN for Tele-workers to Access Company Resources ............................................................................................................................... 45
6.1 Application Scenario ..................................................................................................................................................................................................................... 45
6.2 Configuration Guide ..................................................................................................................................................................................................................... 46
Scenario 7 — Reserving Highest Bandwidth Management Priority for VoIP Traffic ............................................................................................................................... 55
7.1 Application Scenario ..................................................................................................................................................................................................................... 55
7.2 Configuration Guide ..................................................................................................................................................................................................................... 56
Step4. Create a bandwidth management rule and configure .......................................................................................................................................................... 60