ZyXEL Communications 2WG Network Card User Manual


 
List of Figures
ZyWALL 2WG User’s Guide
34
Figure 211 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 335
Figure 212 SECURITY > VPN > SA Monitor ...................................................................................... 338
Figure 213 Overlap in a Dynamic VPN Rule ........................................................................................ 339
Figure 214 Overlap in IP Alias and VPN Remote Networks ................................................................. 340
Figure 215 SECURITY > VPN > Global Setting ................................................................................. 340
Figure 216 Telecommuters Sharing One VPN Rule Example .............................................................. 342
Figure 217 Telecommuters Using Unique VPN Rules Example ........................................................... 343
Figure 218 VPN for Remote Management Example ............................................................................ 344
Figure 219 VPN Topologies .................................................................................................................. 345
Figure 220 Hub-and-spoke VPN Example ...........................................................................................346
Figure 221 Certificates on Your Computer ........................................................................................... 350
Figure 222 Certificate Details .............................................................................................................. 351
Figure 223 Certificate Configuration Overview ..................................................................................... 351
Figure 224 SECURITY > CERTIFICATES > My Certificates ............................................................... 352
Figure 225 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 354
Figure 226 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 356
Figure 227 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 358
Figure 228 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 359
Figure 229 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 360
Figure 230 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 361
Figure 231 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 365
Figure 232 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 367
Figure 233 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 370
Figure 234 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 371
Figure 235 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 372
Figure 236 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 373
Figure 237 SECURITY > CERTIFICATES > Directory Servers ............................................................ 375
Figure 238 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 376
Figure 239 SECURITY > AUTH SERVER > Local User Database ...................................................... 380
Figure 240 SECURITY > AUTH SERVER > RADIUS .......................................................................... 381
Figure 241 How NAT Works ................................................................................................................. 387
Figure 242 NAT Application With IP Alias ............................................................................................ 387
Figure 243 Port Restricted Cone NAT Example ................................................................................... 388
Figure 244 ADVANCED > NAT > NAT Overview .................................................................................. 390
Figure 245 ADVANCED > NAT > Address Mapping ............................................................................. 392
Figure 246 ADVANCED > NAT > Address Mapping > Edit .................................................................. 393
Figure 247 Multiple Servers Behind NAT Example .............................................................................. 396
Figure 248 Port Translation Example ................................................................................................... 397
Figure 249 ADVANCED > NAT > Port Forwarding ............................................................................... 398
Figure 250 Trigger Port Forwarding Process: Example ........................................................................ 399
Figure 251 ADVANCED > NAT > Port Triggering ................................................................................. 400
Figure 252 Example of Static Routing Topology ................................................................................... 401
Figure 253 ADVANCED > STATIC ROUTE > IP Static Route .............................................................. 402