List of Figures

 

 

Figure 211 Multiple Servers Behind NAT Example ...............................................................................

309

Figure 212 Network > Virtual Server ....................................................................................................

310

Figure 213 Network > Virtual Server > Edit ...........................................................................................

311

Figure 214 NAT 1:1 Example Network Topology ..................................................................................

313

Figure 215 Create Address Objects .....................................................................................................

314

Figure 216 Address Objects .................................................................................................................

314

Figure 217 NAT 1:1 Example Virtual Server .........................................................................................

315

Figure 218 Create a Virtual Server .......................................................................................................

315

Figure 219 NAT 1:1 Example Policy Route ..........................................................................................

316

Figure 220 Create a Policy Route ........................................................................................................

316

Figure 221 Create a Firewall Rule ........................................................................................................

317

Figure 222 LAN1 Computer Queries the DNS Server ..........................................................................

317

Figure 223 NAT Loopback Virtual Server .............................................................................................

318

Figure 224 Create a Virtual Server .......................................................................................................

318

Figure 225 Triangle Route ...................................................................................................................

319

Figure 226 NAT Loopback Policy Route .............................................................................................

319

Figure 227 Create a Policy Route ........................................................................................................

320

Figure 228 NAT Loopback Successful ...............................................................................................

320

Figure 229 HTTP Redirect Example .....................................................................................................

321

Figure 230 Network > HTTP Redirect ..................................................................................................

323

Figure 231 Network > HTTP Redirect > Edit ........................................................................................

323

Figure 232 SIP ALG Example .............................................................................................................

325

Figure 233 H.323 ALG Example ..........................................................................................................

326

Figure 234 VoIP Calls from the WAN with Multiple Outgoing Calls ......................................................

327

Figure 235 VoIP with Multiple WAN IP Addresses ...............................................................................

328

Figure 236 Network > ALG ..................................................................................................................

329

Figure 237 Default Firewall Action .......................................................................................................

335

Figure 238 Blocking All LAN to WAN IRC Traffic Example ..................................................................

338

Figure 239 Limited LAN to WAN IRC Traffic Example ..........................................................................

339

Figure 240 Firewall Example: Select the Traveling Direction of Traffic ................................................

341

Figure 241 Firewall Example: Edit a Firewall Rule 1 ............................................................................

341

Figure 242 Firewall Example: Create an Address Object .....................................................................

341

Figure 243 Firewall Example: Create a Service Object ........................................................................

342

Figure 244 Firewall Example: Edit a Firewall Rule ...............................................................................

342

Figure 245 Firewall Example: MyService Example Rule in Summary ..................................................

342

Figure 246 Using Virtual Interfaces to Avoid Asymmetrical Routes .....................................................

343

Figure 247 Firewall ...............................................................................................................................

344

Figure 248 Firewall > Edit .....................................................................................................................

346

Figure 249 IPSec VPN Example ..........................................................................................................

351

Figure 250 VPN: IKE SA and IPSec SA ..............................................................................................

352

Figure 251 VPN > IPSec VPN > VPN Connection ...............................................................................

353

Figure 252 VPN > IPSec VPN > VPN Connection > Edit (IKE)

...........................................................

356

Figure 253 VPN > IPSec VPN > VPN Connection > Manual Key > Edit ..............................................

361

34

ZyWALL USG 100/200 Series User’s Guide