ZyXEL Communications 2 Plus Network Card User Manual


 
List of Figures
ZyWALL 2 Plus User’s Guide
29
Figure 168 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 255
Figure 169 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 260
Figure 170 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 261
Figure 171 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 263
Figure 172 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 264
Figure 173 SECURITY > VPN > SA Monitor ...................................................................................... 267
Figure 174 SECURITY > VPN > Global Setting ................................................................................. 267
Figure 175 Telecommuters Sharing One VPN Rule Example .............................................................. 269
Figure 176 Telecommuters Using Unique VPN Rules Example ........................................................... 270
Figure 177 VPN for Remote Management Example ............................................................................ 271
Figure 178 VPN Topologies .................................................................................................................. 272
Figure 179 Hub-and-spoke VPN Example ...........................................................................................273
Figure 180 Certificates on Your Computer ........................................................................................... 276
Figure 181 Certificate Details .............................................................................................................. 277
Figure 182 Certificate Configuration Overview ..................................................................................... 277
Figure 183 SECURITY > CERTIFICATES > My Certificates ............................................................... 278
Figure 184 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 280
Figure 185 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 283
Figure 186 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 284
Figure 187 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 285
Figure 188 SECURITY > CERTIFICATES > My Certificates > Create ................................................. 286
Figure 189 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 288
Figure 190 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 290
Figure 191 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 292
Figure 192 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 293
Figure 193 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 295
Figure 194 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 297
Figure 195 SECURITY > CERTIFICATES > Directory Servers ............................................................ 298
Figure 196 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 299
Figure 197 SECURITY > AUTH SERVER > Local User Database ...................................................... 303
Figure 198 SECURITY > AUTH SERVER > RADIUS .......................................................................... 304
Figure 199 How NAT Works ................................................................................................................. 310
Figure 200 NAT Application With IP Alias .............................................................................................311
Figure 201 Port Restricted Cone NAT Example ................................................................................... 312
Figure 202 ADVANCED > NAT > NAT Overview .................................................................................. 314
Figure 203 ADVANCED > NAT > Address Mapping ............................................................................. 315
Figure 204 ADVANCED > NAT > Address Mapping > Edit .................................................................. 317
Figure 205 Multiple Servers Behind NAT Example .............................................................................. 319
Figure 206 Port Translation Example ................................................................................................... 319
Figure 207 ADVANCED > NAT > Port Forwarding ............................................................................... 320
Figure 208 Trigger Port Forwarding Process: Example ........................................................................ 322
Figure 209 ADVANCED > NAT > Port Triggering ................................................................................. 322
Figure 210 Example of Static Routing Topology ................................................................................... 325