List of Figures
Figure 211 Multiple Servers Behind NAT Example ...............................................................................
309
Figure 212 Network > Virtual Server ....................................................................................................
310
Figure 213 Network > Virtual Server > Edit ...........................................................................................
311
Figure 214 NAT 1:1 Example Network Topology ..................................................................................
313
Figure 215 Create Address Objects .....................................................................................................
314
Figure 216 Address Objects .................................................................................................................
Figure 217 NAT 1:1 Example Virtual Server .........................................................................................
315
Figure 218 Create a Virtual Server .......................................................................................................
Figure 219 NAT 1:1 Example Policy Route ..........................................................................................
316
Figure 220 Create a Policy Route ........................................................................................................
Figure 221 Create a Firewall Rule ........................................................................................................
317
Figure 222 LAN1 Computer Queries the DNS Server ..........................................................................
Figure 223 NAT Loopback Virtual Server .............................................................................................
318
Figure 224 Create a Virtual Server .......................................................................................................
Figure 225 Triangle Route ...................................................................................................................
319
Figure 226 NAT Loopback Policy Route .............................................................................................
Figure 227 Create a Policy Route ........................................................................................................
320
Figure 228 NAT Loopback Successful ...............................................................................................
Figure 229 HTTP Redirect Example .....................................................................................................
321
Figure 230 Network > HTTP Redirect ..................................................................................................
323
Figure 231 Network > HTTP Redirect > Edit ........................................................................................
Figure 232 SIP ALG Example .............................................................................................................
325
Figure 233 H.323 ALG Example ..........................................................................................................
326
Figure 234 VoIP Calls from the WAN with Multiple Outgoing Calls ......................................................
327
Figure 235 VoIP with Multiple WAN IP Addresses ...............................................................................
328
Figure 236 Network > ALG ..................................................................................................................
329
Figure 237 Default Firewall Action .......................................................................................................
335
Figure 238 Blocking All LAN to WAN IRC Traffic Example ..................................................................
338
Figure 239 Limited LAN to WAN IRC Traffic Example ..........................................................................
339
Figure 240 Firewall Example: Select the Traveling Direction of Traffic ................................................
341
Figure 241 Firewall Example: Edit a Firewall Rule 1 ............................................................................
Figure 242 Firewall Example: Create an Address Object .....................................................................
Figure 243 Firewall Example: Create a Service Object ........................................................................
342
Figure 244 Firewall Example: Edit a Firewall Rule ...............................................................................
Figure 245 Firewall Example: MyService Example Rule in Summary ..................................................
Figure 246 Using Virtual Interfaces to Avoid Asymmetrical Routes .....................................................
343
Figure 247 Firewall ...............................................................................................................................
344
Figure 248 Firewall > Edit .....................................................................................................................
346
Figure 249 IPSec VPN Example ..........................................................................................................
351
Figure 250 VPN: IKE SA and IPSec SA ..............................................................................................
352
Figure 251 VPN > IPSec VPN > VPN Connection ...............................................................................
353
Figure 252 VPN > IPSec VPN > VPN Connection > Edit (IKE)
...........................................................
356
Figure 253 VPN > IPSec VPN > VPN Connection > Manual Key > Edit ..............................................
361
34
ZyWALL USG 100/200 Series User’s Guide