List of Figures
Figure 211 SECURITY > CERTIFICATES > Directory Servers ............................................................
320
Figure 212 SECURITY > CERTIFICATES > Directory Server > Add ...................................................
321
Figure 213 SECURITY > AUTH SERVER > Local User Database ......................................................
325
Figure 214 SECURITY > AUTH SERVER > RADIUS ..........................................................................
326
Figure 215 How NAT Works .................................................................................................................
333
Figure 216 NAT Application With IP Alias ............................................................................................
Figure 217 Port Restricted Cone NAT Example ...................................................................................
334
Figure 218 ADVANCED > NAT > NAT Overview ..................................................................................
336
Figure 219 ADVANCED > NAT > Address Mapping .............................................................................
338
Figure 220 ADVANCED > NAT > Address Mapping > Edit ..................................................................
339
Figure 221 Multiple Servers Behind NAT Example ..............................................................................
341
Figure 222 Port Translation Example ...................................................................................................
342
Figure 223 ADVANCED > NAT > Port Forwarding ...............................................................................
343
Figure 224 Trigger Port Forwarding Process: Example ........................................................................
344
Figure 225 ADVANCED > NAT > Port Triggering .................................................................................
345
Figure 226 Example of Static Routing Topology ...................................................................................
347
Figure 227 ADVANCED > STATIC ROUTE > IP Static Route ..............................................................
348
Figure 228 ADVANCED > STATIC ROUTE > IP Static Route > Edit ....................................................
349
Figure 229 Subnet-based Bandwidth Management Example ..............................................................
352
Figure 230 ADVANCED > BW MGMT > Summary ..............................................................................
357
Figure 231 ADVANCED > BW MGMT > Class Setup ..........................................................................
358
Figure 232 ADVANCED > BW MGMT > Class Setup > Add Sub-Class ..............................................
360
Figure 233 ADVANCED > BW MGMT > Class Setup > Statistics ........................................................
362
Figure 234 ADVANCED > BW MGMT > Monitor .................................................................................
363
Figure 235 Private DNS Server Example .............................................................................................
367
Figure 236 ADVANCED > DNS > System DNS ...................................................................................
Figure 237 ADVANCED > DNS > Add (Address Record) ....................................................................
369
Figure 238 ADVANCED > DNS > Insert (Name Server Record) ..........................................................
370
Figure 239 ADVANCED > DNS > Cache .............................................................................................
371
Figure 240 ADVANCED > DNS > DHCP ..............................................................................................
373
Figure 241 ADVANCED > DNS > DDNS ..............................................................................................
375
Figure 242 Secure and Insecure Remote Management From the WAN ..............................................
377
Figure 243 HTTPS Implementation ......................................................................................................
379
Figure 244 ADVANCED > REMOTE MGMT > WWW ..........................................................................
Figure 245 Security Alert Dialog Box (Internet Explorer) ......................................................................
381
Figure 246 Security Certificate 1 (Netscape) ........................................................................................
382
Figure 247 Security Certificate 2 (Netscape) ........................................................................................
Figure 248 Example: Lock Denoting a Secure Connection .................................................................
383
Figure 249 Replace Certificate .............................................................................................................
384
Figure 250 Device-specific Certificate ..................................................................................................
Figure 251 Common ZyWALL Certificate .............................................................................................
Figure 252 SSH Communication Over the WAN Example ..................................................................
385
Figure 253 How SSH Works .................................................................................................................
32
ZyWALL 2 Plus User’s Guide