List of Figures
ZyWALL 5/35/70 Series User’s Guide
36
Figure 211 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 370
Figure 212 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 371
Figure 213 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 373
Figure 214 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 378
Figure 215 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 379
Figure 216 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 381
Figure 217 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 382
Figure 218 SECURITY > VPN > SA Monitor ....................................................................................... 385
Figure 219 Overlap in a Dynamic VPN Rule ........................................................................................ 386
Figure 220 Overlap in IP Alias and VPN Remote Networks ................................................................. 387
Figure 221 SECURITY > VPN > Global Setting .................................................................................. 387
Figure 222 Telecommuters Sharing One VPN Rule Example .............................................................. 389
Figure 223 Telecommuters Using Unique VPN Rules Example ........................................................... 390
Figure 224 VPN for Remote Management Example ............................................................................ 391
Figure 225 VPN Topologies .................................................................................................................. 392
Figure 226 Hub-and-spoke VPN Example ...........................................................................................393
Figure 227 Certificates on Your Computer ........................................................................................... 396
Figure 228 Certificate Details .............................................................................................................. 397
Figure 229 Certificate Configuration Overview ..................................................................................... 397
Figure 230 SECURITY > CERTIFICATES > My Certificates ............................................................... 398
Figure 231 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 400
Figure 232 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 402
Figure 233 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 404
Figure 234 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 405
Figure 235 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 406
Figure 236 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 407
Figure 237 SECURITY > CERTIFICATES > Trusted CAs ....................................................................411
Figure 238 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 413
Figure 239 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 416
Figure 240 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 417
Figure 241 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 418
Figure 242 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 419
Figure 243 SECURITY > CERTIFICATES > Directory Servers ............................................................ 421
Figure 244 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 422
Figure 245 SECURITY > AUTH SERVER > Local User Database ...................................................... 426
Figure 246 SECURITY > AUTH SERVER > RADIUS .......................................................................... 427
Figure 247 How NAT Works ................................................................................................................. 433
Figure 248 NAT Application With IP Alias ............................................................................................ 433
Figure 249 Port Restricted Cone NAT Example ................................................................................... 434
Figure 250 ADVANCED > NAT > NAT Overview .................................................................................. 436
Figure 251 ADVANCED > NAT > Address Mapping ............................................................................. 438
Figure 252 ADVANCED > NAT > Address Mapping > Edit .................................................................. 440
Figure 253 Multiple Servers Behind NAT Example .............................................................................. 442