List of Figures

 

 

Figure 211 SECURITY > VPN > VPN Rules (Manual) > Edit ..............................................................

335

Figure 212 SECURITY > VPN > SA Monitor ......................................................................................

338

Figure 213 Overlap in a Dynamic VPN Rule ........................................................................................

339

Figure 214 Overlap in IP Alias and VPN Remote Networks .................................................................

340

Figure 215 SECURITY > VPN > Global Setting .................................................................................

340

Figure 216 Telecommuters Sharing One VPN Rule Example ..............................................................

342

Figure 217 Telecommuters Using Unique VPN Rules Example ...........................................................

343

Figure 218 VPN for Remote Management Example ............................................................................

344

Figure 219 VPN Topologies ..................................................................................................................

345

Figure 220 Hub-and-spoke VPN Example ...........................................................................................

346

Figure 221 Certificates on Your Computer ...........................................................................................

350

Figure 222 Certificate Details ..............................................................................................................

351

Figure 223 Certificate Configuration Overview .....................................................................................

351

Figure 224 SECURITY > CERTIFICATES > My Certificates ...............................................................

352

Figure 225 SECURITY > CERTIFICATES > My Certificates > Details .................................................

354

Figure 226 SECURITY > CERTIFICATES > My Certificates > Export .................................................

356

Figure 227 SECURITY > CERTIFICATES > My Certificates > Import .................................................

358

Figure 228 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ...............................

359

Figure 229 SECURITY > CERTIFICATES > My Certificates > Create (Basic) ....................................

360

Figure 230 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) .............................

361

Figure 231 SECURITY > CERTIFICATES > Trusted CAs ...................................................................

365

Figure 232 SECURITY > CERTIFICATES > Trusted CAs > Details ....................................................

367

Figure 233 SECURITY > CERTIFICATES > Trusted CAs > Import .....................................................

370

Figure 234 SECURITY > CERTIFICATES > Trusted Remote Hosts ....................................................

371

Figure 235 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import .....................................

372

Figure 236 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details .....................................

373

Figure 237 SECURITY > CERTIFICATES > Directory Servers ............................................................

375

Figure 238 SECURITY > CERTIFICATES > Directory Server > Add ...................................................

376

Figure 239 SECURITY > AUTH SERVER > Local User Database ......................................................

380

Figure 240 SECURITY > AUTH SERVER > RADIUS ..........................................................................

381

Figure 241 How NAT Works .................................................................................................................

387

Figure 242 NAT Application With IP Alias ............................................................................................

387

Figure 243 Port Restricted Cone NAT Example ...................................................................................

388

Figure 244 ADVANCED > NAT > NAT Overview ..................................................................................

390

Figure 245 ADVANCED > NAT > Address Mapping .............................................................................

392

Figure 246 ADVANCED > NAT > Address Mapping > Edit ..................................................................

393

Figure 247 Multiple Servers Behind NAT Example ..............................................................................

396

Figure 248 Port Translation Example ...................................................................................................

397

Figure 249 ADVANCED > NAT > Port Forwarding ...............................................................................

398

Figure 250 Trigger Port Forwarding Process: Example ........................................................................

399

Figure 251 ADVANCED > NAT > Port Triggering .................................................................................

400

Figure 252 Example of Static Routing Topology ...................................................................................

401

Figure 253 ADVANCED > STATIC ROUTE > IP Static Route ..............................................................

402

34

ZyWALL 2WG User’s Guide