List of Figures

Figure 168 VPN: Example ....................................................................................................................

253

Figure 169 VPN: IKE SA and IPSec SA ..............................................................................................

254

Figure 170 Gateway and Network Policies ..........................................................................................

255

Figure 171 IPSec Fields Summary .....................................................................................................

255

Figure 172 SECURITY > VPN > VPN Rules (IKE) ..............................................................................

256

Figure 173 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .........................................

257

Figure 174 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ......................................

258

Figure 175 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication .............................................

258

Figure 176 VPN/NAT Example .............................................................................................................

261

Figure 177 IPSec High Availability .......................................................................................................

263

Figure 178 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy .........................................

265

Figure 179 Virtual Mapping of Local and Remote Network IP Addresses ............................................

271

Figure 180 VPN: Transport and Tunnel Mode Encapsulation ..............................................................

272

Figure 181 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ...........................................

274

Figure 182 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding

............. 279

Figure 183 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................

280

Figure 184 SECURITY > VPN > VPN Rules (Manual) ........................................................................

282

Figure 185 SECURITY > VPN > VPN Rules (Manual) > Edit ..............................................................

283

Figure 186 SECURITY > VPN > SA Monitor ......................................................................................

286

Figure 187 Overlap in a Dynamic VPN Rule ........................................................................................

287

Figure 188 Overlap in IP Alias and VPN Remote Networks .................................................................

287

Figure 189 SECURITY > VPN > Global Setting .................................................................................

288

Figure 190 Telecommuters Sharing One VPN Rule Example ..............................................................

289

Figure 191 Telecommuters Using Unique VPN Rules Example ...........................................................

290

Figure 192 VPN for Remote Management Example ............................................................................

292

Figure 193 VPN Topologies ..................................................................................................................

292

Figure 194 Hub-and-spoke VPN Example ...........................................................................................

293

Figure 195 Certificates on Your Computer ...........................................................................................

296

Figure 196 Certificate Details ..............................................................................................................

297

Figure 197 Certificate Configuration Overview .....................................................................................

297

Figure 198 SECURITY > CERTIFICATES > My Certificates ...............................................................

298

Figure 199 SECURITY > CERTIFICATES > My Certificates > Details .................................................

300

Figure 200 SECURITY > CERTIFICATES > My Certificates > Export .................................................

302

Figure 201 SECURITY > CERTIFICATES > My Certificates > Import .................................................

304

Figure 202 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ...............................

305

Figure 203 SECURITY > CERTIFICATES > My Certificates > Create (Basic) ....................................

306

Figure 204 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) .............................

307

Figure 205 SECURITY > CERTIFICATES > Trusted CAs ....................................................................

311

Figure 206 SECURITY > CERTIFICATES > Trusted CAs > Details ....................................................

312

Figure 207 SECURITY > CERTIFICATES > Trusted CAs > Import .....................................................

315

Figure 208 SECURITY > CERTIFICATES > Trusted Remote Hosts ....................................................

315

Figure 209 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details .....................................

317

Figure 210 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import .....................................

319

ZyWALL 2 Plus User’s Guide

31