Table of Contents
ZyWALL USG 100/200 Series User’s Guide
19
19.3 NAT Technical Reference ................................................................................................ 423
Chapter 20
HTTP Redirect ......................................................................................................................427
20.1 Overview .......................................................................................................................... 427
20.1.1 What You Can Do in this Chapter .......................................................................... 427
20.1.2 What You Need to Know ........................................................................................ 428
20.2 The HTTP Redirect Screen ............................................................................................. 429
20.2.1 The HTTP Redirect Edit Screen ............................................................................. 430
Chapter 21
ALG ........................................................................................................................................431
21.1 ALG Overview ................................................................................................................. 431
21.1.1 What You Can Do in this Chapter .......................................................................... 431
21.1.2 What You Need to Know ........................................................................................ 432
21.1.3 Before You Begin ................................................................................................... 435
21.2 The ALG Screen .............................................................................................................. 435
21.3 ALG Technical Reference ................................................................................................ 437
Chapter 22
IP/MAC Binding....................................................................................................................439
22.1 IP/MAC Binding Overview ............................................................................................... 439
22.1.1 What You Can Do in this Chapter .......................................................................... 439
22.1.2 What You Need to Know ........................................................................................ 440
22.2 IP/MAC Binding Summary ............................................................................................... 440
22.2.1 IP/MAC Binding Edit ............................................................................................... 441
22.2.2 Static DHCP Edit .................................................................................................... 442
22.3 IP/MAC Binding Exempt List ........................................................................................... 443
Chapter 23
Authentication Policy...........................................................................................................445
23.1 Overview .......................................................................................................................... 445
23.1.1 What You Can Do in this Chapter .......................................................................... 445
23.1.2 What You Need to Know ........................................................................................ 446
23.2 Authentication Policy Screen ........................................................................................... 446
23.2.1 Creating/Editing an Authentication Policy .............................................................. 449
Chapter 24
Firewall...................................................................................................................................453
24.1 Overview .......................................................................................................................... 453
24.1.1 What You Can Do in this Chapter .......................................................................... 453
24.1.2 What You Need to Know ........................................................................................ 454
24.1.3 Firewall Rule Example Applications ....................................................................... 456