ZyWALL 2 Series User’s Guide
xvi List of Figures
Figure 8-3 Multiple Servers Behind NAT Example........................................................................................8-6
Figure 8-4 SUA Server ...................................................................................................................................8-7
Figure 8-5 Address Mapping ..........................................................................................................................8-9
Figure 8-6 Address Mapping Rule................................................................................................................8-10
Figure 8-7 Trigger Port Forwarding Example...............................................................................................8-12
Figure 8-8 Trigger Port .................................................................................................................................8-13
Figure 9-1 Example of Static Routing Topology ............................................................................................9-1
Figure 9-2 Static Route Screen .......................................................................................................................9-2
Figure 9-3 Edit IP Static Route.......................................................................................................................9-3
Figure 10-1 ZyWALL Firewall Application .................................................................................................10-3
Figure 10-2 Three-Way Handshake ..............................................................................................................10-5
Figure 10-3 SYN Flood ................................................................................................................................10-5
Figure 10-4 Smurf Attack.............................................................................................................................10-6
Figure 10-5 Stateful Inspection.....................................................................................................................10-8
Figure 11-1 LAN to WAN Traffic.................................................................................................................11-4
Figure 11-2 WAN to LAN Traffic.................................................................................................................11-5
Figure 11-3 Enabling the Firewall ................................................................................................................11-6
Figure 11-4 Creating/Editing A Firewall Rule..............................................................................................11-9
Figure 11-5 Adding/Editing Source and Destination Addresses................................................................. 11-11
Figure 11-6 Creating/Editing A Custom Port..............................................................................................11-12
Figure 11-7 Firewall IP Config Screen .......................................................................................................11-14
Figure 11-8 Firewall Rule Edit IP Example................................................................................................11-15
Figure 11-9 Edit Custom Port Example......................................................................................................11-15
Figure 11-10 MyService Rule Configuration .............................................................................................11-16
Figure 11-11 My Service Example Rule Summary ....................................................................................11-17
Figure 11-12 Attack Alert ...........................................................................................................................11-22
Figure 12-1 Content Filter : General.............................................................................................................12-2
Figure 12-2 Content Filtering Lookup Procedure.........................................................................................12-4
Figure 12-3 Content Filter : Categories ........................................................................................................12-6
Figure 12-4 Content Filter : Customization................................................................................................12-15
Figure 13-1 Encryption and Decryption .......................................................................................................13-2
Figure 13-2 IPSec Architecture.....................................................................................................................13-3
Figure 13-3 Transport and Tunnel Mode IPSec Encapsulation.....................................................................13-4
Figure 14-1 IPSec Summary Fields..............................................................................................................14-3
Figure 14-2 VPN Rules.................................................................................................................................14-4
Figure 14-3 NAT Router Between IPSec Routers.........................................................................................14-6
Figure 14-4 VPN Host using Intranet DNS Server Example........................................................................14-7
Figure 14-5 Client-to-Site VPN Example...................................................................................................14-10
Figure 14-6 Site-to-Site VPN Example ......................................................................................................14-11
Figure 14-7 Basic IKE VPN Rule Edit.......................................................................................................14-12
Figure 14-8 Two Phases to Set Up the IPSec SA........................................................................................14-22