ZyWALL 10~100 Series Internet Security Gateway

List of Diagrams

Diagram 2-1 Ideal Setup ................................................................................................................................

2-1

Diagram 2-2 “Triangle Route” Problem ........................................................................................................

2-2

Diagram 2-3 IP Alias......................................................................................................................................

2-2

Diagram 2-4 Gateways on the WAN Side......................................................................................................

2-3

Diagram 3-1 Big Picture— Filtering, Firewall, VPN and NAT .....................................................................

3-1

Diagram 4-1 Peer-to-Peer Communication in an Ad-hoc Network................................................................

4-3

Diagram 4-2 ESS Provides Campus-Wide Coverage.....................................................................................

4-4

Diagram 5-1 Sequences for EAP MD5–Challenge Authentication................................................................

5-2

Diagram 6-1 Single-PC per Modem Hardware Configuration.......................................................................

6-1

Diagram 6-2 ZyWALL as a PPPoE Client .....................................................................................................

6-2

Diagram 7-1 Transport PPP frames over Ethernet .........................................................................................

7-1

Diagram 7-2 PPTP Protocol Overview ..........................................................................................................

7-2

Diagram 7-3 Example Message Exchange between PC and an ANT ............................................................

7-3

Diagram 11-1 NetBIOS Display Filter Settings Command Without DMZ Example....................................

11-2

Diagram 11-2 NetBIOS Display Filter Settings Command With DMZ Example.........................................

11-2

Diagram 12-1 Option to Enter Debug Mode................................................................................................

12-1

Diagram 12-2 Boot Module Commands ......................................................................................................

12-2

Diagram 13-1 Example VPN Initiator IPSec Log......................................................................................

13-12

Diagram 13-2 Example VPN Responder IPSec Log..................................................................................

13-12

List of Diagrams

ix