List of Figures
Figure 168 VPN: Example ....................................................................................................................
253
Figure 169 VPN: IKE SA and IPSec SA ..............................................................................................
254
Figure 170 Gateway and Network Policies ..........................................................................................
255
Figure 171 IPSec Fields Summary .....................................................................................................
Figure 172 SECURITY > VPN > VPN Rules (IKE) ..............................................................................
256
Figure 173 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .........................................
257
Figure 174 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ......................................
258
Figure 175 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication .............................................
Figure 176 VPN/NAT Example .............................................................................................................
261
Figure 177 IPSec High Availability .......................................................................................................
263
Figure 178 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy .........................................
265
Figure 179 Virtual Mapping of Local and Remote Network IP Addresses ............................................
271
Figure 180 VPN: Transport and Tunnel Mode Encapsulation ..............................................................
272
Figure 181 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ...........................................
274
Figure 182 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding
............. 279
Figure 183 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................
280
Figure 184 SECURITY > VPN > VPN Rules (Manual) ........................................................................
282
Figure 185 SECURITY > VPN > VPN Rules (Manual) > Edit ..............................................................
283
Figure 186 SECURITY > VPN > SA Monitor ......................................................................................
286
Figure 187 Overlap in a Dynamic VPN Rule ........................................................................................
287
Figure 188 Overlap in IP Alias and VPN Remote Networks .................................................................
Figure 189 SECURITY > VPN > Global Setting .................................................................................
288
Figure 190 Telecommuters Sharing One VPN Rule Example ..............................................................
289
Figure 191 Telecommuters Using Unique VPN Rules Example ...........................................................
290
Figure 192 VPN for Remote Management Example ............................................................................
292
Figure 193 VPN Topologies ..................................................................................................................
Figure 194 Hub-and-spoke VPN Example ...........................................................................................
293
Figure 195 Certificates on Your Computer ...........................................................................................
296
Figure 196 Certificate Details ..............................................................................................................
297
Figure 197 Certificate Configuration Overview .....................................................................................
Figure 198 SECURITY > CERTIFICATES > My Certificates ...............................................................
298
Figure 199 SECURITY > CERTIFICATES > My Certificates > Details .................................................
300
Figure 200 SECURITY > CERTIFICATES > My Certificates > Export .................................................
302
Figure 201 SECURITY > CERTIFICATES > My Certificates > Import .................................................
304
Figure 202 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ...............................
305
Figure 203 SECURITY > CERTIFICATES > My Certificates > Create (Basic) ....................................
306
Figure 204 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) .............................
307
Figure 205 SECURITY > CERTIFICATES > Trusted CAs ....................................................................
311
Figure 206 SECURITY > CERTIFICATES > Trusted CAs > Details ....................................................
312
Figure 207 SECURITY > CERTIFICATES > Trusted CAs > Import .....................................................
315
Figure 208 SECURITY > CERTIFICATES > Trusted Remote Hosts ....................................................
Figure 209 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details .....................................
317
Figure 210 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import .....................................
319
ZyWALL 2 Plus User’s Guide
31