EasyManua.ls Logo

ZyXEL Communications ZYWALL 35 - Page 36

ZyXEL Communications ZYWALL 35
872 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
ZyWALL 5/35/70 Series User’s Guide
36
Figure 211 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 370
Figure 212 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 371
Figure 213 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 373
Figure 214 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 378
Figure 215 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 379
Figure 216 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 381
Figure 217 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 382
Figure 218 SECURITY > VPN > SA Monitor ....................................................................................... 385
Figure 219 Overlap in a Dynamic VPN Rule ........................................................................................ 386
Figure 220 Overlap in IP Alias and VPN Remote Networks ................................................................. 387
Figure 221 SECURITY > VPN > Global Setting .................................................................................. 387
Figure 222 Telecommuters Sharing One VPN Rule Example .............................................................. 389
Figure 223 Telecommuters Using Unique VPN Rules Example ........................................................... 390
Figure 224 VPN for Remote Management Example ............................................................................ 391
Figure 225 VPN Topologies .................................................................................................................. 392
Figure 226 Hub-and-spoke VPN Example ...........................................................................................393
Figure 227 Certificates on Your Computer ........................................................................................... 396
Figure 228 Certificate Details .............................................................................................................. 397
Figure 229 Certificate Configuration Overview ..................................................................................... 397
Figure 230 SECURITY > CERTIFICATES > My Certificates ............................................................... 398
Figure 231 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 400
Figure 232 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 402
Figure 233 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 404
Figure 234 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 405
Figure 235 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 406
Figure 236 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 407
Figure 237 SECURITY > CERTIFICATES > Trusted CAs ....................................................................411
Figure 238 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 413
Figure 239 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 416
Figure 240 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 417
Figure 241 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 418
Figure 242 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 419
Figure 243 SECURITY > CERTIFICATES > Directory Servers ............................................................ 421
Figure 244 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 422
Figure 245 SECURITY > AUTH SERVER > Local User Database ...................................................... 426
Figure 246 SECURITY > AUTH SERVER > RADIUS .......................................................................... 427
Figure 247 How NAT Works ................................................................................................................. 433
Figure 248 NAT Application With IP Alias ............................................................................................ 433
Figure 249 Port Restricted Cone NAT Example ................................................................................... 434
Figure 250 ADVANCED > NAT > NAT Overview .................................................................................. 436
Figure 251 ADVANCED > NAT > Address Mapping ............................................................................. 438
Figure 252 ADVANCED > NAT > Address Mapping > Edit .................................................................. 440
Figure 253 Multiple Servers Behind NAT Example .............................................................................. 442

Table of Contents

Other manuals for ZyXEL Communications ZYWALL 35

Related product manuals