Table of Contents
ZyWALL 5/35/70 Series User’s Guide
22
25.10.2 High Availability .................................................................................................... 484
25.11 Configuring Dynamic DNS ............................................................................................. 484
Chapter 26
Remote Management............................................................................................................487
26.1 Remote Management Overview ...................................................................................... 487
26.1.1 Remote Management Limitations .......................................................................... 488
26.1.2 System Timeout ..................................................................................................... 488
26.2 WWW (HTTP and HTTPS) ............................................................................................ 488
26.3 WWW .............................................................................................................................. 489
26.4 HTTPS Example .............................................................................................................. 491
26.4.1 Internet Explorer Warning Messages ..................................................................... 491
26.4.2 Netscape Navigator Warning Messages ................................................................ 491
26.4.3 Avoiding the Browser Warning Messages .............................................................. 492
26.4.4 Login Screen .......................................................................................................... 493
26.4.5 Enrolling and Importing SSL Client Certificates ..................................................... 495
26.4.6 Using a Certificate When Accessing the ZyWALL Example .................................. 500
26.5 SSH .............................................................................................................................. 501
26.6 How SSH Works .............................................................................................................. 501
26.7 SSH Implementation on the ZyWALL .............................................................................. 502
26.7.1 Requirements for Using SSH ................................................................................. 502
26.8 Configuring SSH .............................................................................................................. 502
26.9 Secure Telnet Using SSH Examples ............................................................................... 503
26.9.1 Example 1: Microsoft Windows .............................................................................. 503
26.9.2 Example 2: Linux .................................................................................................... 504
26.10 Secure FTP Using SSH Example .................................................................................. 505
26.11 Telnet ........................................................................................................................... 506
26.12 Configuring TELNET ..................................................................................................... 506
26.13 FTP .............................................................................................................................. 507
26.14 SNMP .......................................................................................................................... 508
26.14.1 Supported MIBs .................................................................................................. 509
26.14.2 SNMP Traps ......................................................................................................... 509
26.14.3 REMOTE MANAGEMENT: SNMP ....................................................................... 509
26.15 DNS ..............................................................................................................................511
26.16 Introducing Vantage CNM ..............................................................................................511
26.17 Configuring CNM ........................................................................................................... 512
26.17.1 Additional Configuration for Vantage CNM .......................................................... 513
Chapter 27
UPnP ......................................................................................................................................515
27.1 Universal Plug and Play Overview ................................................................................ 515
27.1.1 How Do I Know If I'm Using UPnP? ....................................................................... 515
27.1.2 NAT Traversal ........................................................................................................ 515