List of Figures

Figure 211 SECURITY > CERTIFICATES > Directory Servers ............................................................

320

 

Figure 212 SECURITY > CERTIFICATES > Directory Server > Add ...................................................

321

 

Figure 213 SECURITY > AUTH SERVER > Local User Database ......................................................

325

 

Figure 214 SECURITY > AUTH SERVER > RADIUS ..........................................................................

326

 

Figure 215 How NAT Works .................................................................................................................

333

 

Figure 216 NAT Application With IP Alias ............................................................................................

333

 

Figure 217 Port Restricted Cone NAT Example ...................................................................................

334

 

Figure 218 ADVANCED > NAT > NAT Overview ..................................................................................

336

 

Figure 219 ADVANCED > NAT > Address Mapping .............................................................................

338

 

Figure 220 ADVANCED > NAT > Address Mapping > Edit ..................................................................

339

 

Figure 221 Multiple Servers Behind NAT Example ..............................................................................

341

 

Figure 222 Port Translation Example ...................................................................................................

342

 

Figure 223 ADVANCED > NAT > Port Forwarding ...............................................................................

343

 

Figure 224 Trigger Port Forwarding Process: Example ........................................................................

344

 

Figure 225 ADVANCED > NAT > Port Triggering .................................................................................

345

 

Figure 226 Example of Static Routing Topology ...................................................................................

347

 

Figure 227 ADVANCED > STATIC ROUTE > IP Static Route ..............................................................

348

 

Figure 228 ADVANCED > STATIC ROUTE > IP Static Route > Edit ....................................................

349

 

Figure 229 Subnet-based Bandwidth Management Example ..............................................................

352

 

Figure 230 ADVANCED > BW MGMT > Summary ..............................................................................

357

 

Figure 231 ADVANCED > BW MGMT > Class Setup ..........................................................................

358

 

Figure 232 ADVANCED > BW MGMT > Class Setup > Add Sub-Class ..............................................

360

 

Figure 233 ADVANCED > BW MGMT > Class Setup > Statistics ........................................................

362

 

Figure 234 ADVANCED > BW MGMT > Monitor .................................................................................

363

 

Figure 235 Private DNS Server Example .............................................................................................

367

 

Figure 236 ADVANCED > DNS > System DNS ...................................................................................

367

 

Figure 237 ADVANCED > DNS > Add (Address Record) ....................................................................

369

 

Figure 238 ADVANCED > DNS > Insert (Name Server Record) ..........................................................

370

 

Figure 239 ADVANCED > DNS > Cache .............................................................................................

371

 

Figure 240 ADVANCED > DNS > DHCP ..............................................................................................

373

 

Figure 241 ADVANCED > DNS > DDNS ..............................................................................................

375

 

Figure 242 Secure and Insecure Remote Management From the WAN ..............................................

377

 

Figure 243 HTTPS Implementation ......................................................................................................

379

 

Figure 244 ADVANCED > REMOTE MGMT > WWW ..........................................................................

379

 

Figure 245 Security Alert Dialog Box (Internet Explorer) ......................................................................

381

 

Figure 246 Security Certificate 1 (Netscape) ........................................................................................

382

 

Figure 247 Security Certificate 2 (Netscape) ........................................................................................

382

 

Figure 248 Example: Lock Denoting a Secure Connection .................................................................

383

 

Figure 249 Replace Certificate .............................................................................................................

384

 

Figure 250 Device-specific Certificate ..................................................................................................

384

 

Figure 251 Common ZyWALL Certificate .............................................................................................

384

 

Figure 252 SSH Communication Over the WAN Example ..................................................................

385

 

Figure 253 How SSH Works .................................................................................................................

385

 

 

 

 

32

 

 

 

 

ZyWALL 2 Plus User’s Guide