List of Figures

Figure 254 VPN > IPSec VPN > VPN Gateway ...................................................................................

363

Figure 255 VPN > IPSec VPN > VPN Gateway > Edit .........................................................................

365

Figure 256 VPN Topologies (Fully Meshed and Hub and Spoke) ........................................................

369

Figure 257 VPN > IPSec VPN > Concentrator .....................................................................................

370

Figure 258 VPN > IPSec VPN > Concentrator > Edit ...........................................................................

370

Figure 259 Network > IPSec VPN > Concentrator > Edit > Member ....................................................

371

Figure 260 VPN > IPSec VPN > SA Monitor ........................................................................................

372

Figure 261 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .......................................

373

Figure 262 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ....................................

374

Figure 263 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ...........................................

375

Figure 264 VPN/NAT Example .............................................................................................................

377

Figure 265 VPN: Transport and Tunnel Mode Encapsulation ..............................................................

380

Figure 266 VPN Example: NAT for Inbound and Outbound Traffic ......................................................

382

Figure 267 Network Access Mode: Reverse Proxy .............................................................................

385

Figure 268 Network Access Mode: Full Tunnel Mode .........................................................................

386

Figure 269 VPN > SSL VPN > Access Privilege .................................................................................

387

Figure 270 VPN > SSL VPN > Access Privilege > Add/Edit ................................................................

388

Figure 271 VPN > SSL VPN > Connection Monitor ............................................................................

390

Figure 272 VPN > SSL VPN > Global Setting .....................................................................................

391

Figure 273 Example Logo Graphic Display .........................................................................................

392

Figure 274 SSL VPN Client Portal Screen Example ...........................................................................

393

Figure 275 Network Example ..............................................................................................................

395

Figure 276 Enter the Address in a Web Browser ...............................................................................

396

Figure 277 Login Security Screen .....................................................................................................

397

Figure 278 Login Screen ....................................................................................................................

397

Figure 279 Java Needed Message .....................................................................................................

397

Figure 280 SecuExtender Progress ..................................................................................................

398

Figure 281 Remote User Screen ..........................................................................................................

398

Figure 282 Add Favorite ......................................................................................................................

399

Figure 283 Logout: Prompt ..................................................................................................................

399

Figure 284 Logout: Connection Termination Progress ........................................................................

400

Figure 285 Application .........................................................................................................................

401

Figure 286 File Sharing .......................................................................................................................

404

Figure 287 File Sharing: Enter Access User Name and Password ....................................................

404

Figure 288 File Sharing: Open a Word File ........................................................................................

405

Figure 289 File Sharing: Save a Word File .........................................................................................

406

Figure 290 File Sharing: Save a Word File .........................................................................................

406

Figure 291 File Sharing: Rename ........................................................................................................

407

Figure 292 File Sharing: Rename ........................................................................................................

407

Figure 293 File Sharing: Delete Prompt ..............................................................................................

407

Figure 294 File Sharing: File Upload ...................................................................................................

408

Figure 295 L2TP VPN Overview ..........................................................................................................

409

Figure 296 Policy Route for L2TP VPN ...............................................................................................

410

ZyWALL USG 100/200 Series User’s Guide

35