List of Figures
ZyWALL 5/35/70 Series User’s Guide
34
Figure 211 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 368
Figure 212 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 373
Figure 213 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 374
Figure 214 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 375
Figure 215 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 376
Figure 216 SECURITY > VPN > SA Monitor ....................................................................................... 379
Figure 217 Overlap in a Dynamic VPN Rule ........................................................................................ 380
Figure 218 Overlap in IP Alias and VPN Remote Networks ................................................................. 381
Figure 219 SECURITY > VPN > Global Setting .................................................................................. 381
Figure 220 Telecommuters Sharing One VPN Rule Example .............................................................. 383
Figure 221 Telecommuters Using Unique VPN Rules Example ........................................................... 384
Figure 222 VPN for Remote Management Example ............................................................................ 385
Figure 223 VPN Topologies .................................................................................................................. 386
Figure 224 Hub-and-spoke VPN Example ...........................................................................................387
Figure 225 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ......................................... 388
Figure 226 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ...................................... 389
Figure 227 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 389
Figure 228 VPN/NAT Example ............................................................................................................. 392
Figure 229 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 394
Figure 230 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 394
Figure 231 IPSec High Availability ....................................................................................................... 397
Figure 232 Certificates on Your Computer ........................................................................................... 400
Figure 233 Certificate Details .............................................................................................................. 401
Figure 234 SECURITY > CERTIFICATES > My Certificates ............................................................... 402
Figure 235 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 404
Figure 236 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 406
Figure 237 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 408
Figure 238 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 408
Figure 239 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 409
Figure 240 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 410
Figure 241 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 414
Figure 242 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 416
Figure 243 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 419
Figure 244 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 420
Figure 245 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 421
Figure 246 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 422
Figure 247 SECURITY > CERTIFICATES > Directory Servers ............................................................ 424
Figure 248 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 425
Figure 249 SECURITY > AUTH SERVER > Local User Database ...................................................... 429
Figure 250 SECURITY > AUTH SERVER > RADIUS .......................................................................... 430
Figure 251 ADVANCED > NAT > NAT Overview .................................................................................. 437
Figure 252 ADVANCED > NAT > Address Mapping ............................................................................. 439
Figure 253 ADVANCED > NAT > Address Mapping > Edit .................................................................. 440