List of Figures
Figure 211 SECURITY > VPN > VPN Rules (Manual) > Edit ..............................................................
335
Figure 212 SECURITY > VPN > SA Monitor ......................................................................................
338
Figure 213 Overlap in a Dynamic VPN Rule ........................................................................................
339
Figure 214 Overlap in IP Alias and VPN Remote Networks .................................................................
340
Figure 215 SECURITY > VPN > Global Setting .................................................................................
Figure 216 Telecommuters Sharing One VPN Rule Example ..............................................................
342
Figure 217 Telecommuters Using Unique VPN Rules Example ...........................................................
343
Figure 218 VPN for Remote Management Example ............................................................................
344
Figure 219 VPN Topologies ..................................................................................................................
345
Figure 220 Hub-and-spoke VPN Example ...........................................................................................
346
Figure 221 Certificates on Your Computer ...........................................................................................
350
Figure 222 Certificate Details ..............................................................................................................
351
Figure 223 Certificate Configuration Overview .....................................................................................
Figure 224 SECURITY > CERTIFICATES > My Certificates ...............................................................
352
Figure 225 SECURITY > CERTIFICATES > My Certificates > Details .................................................
354
Figure 226 SECURITY > CERTIFICATES > My Certificates > Export .................................................
356
Figure 227 SECURITY > CERTIFICATES > My Certificates > Import .................................................
358
Figure 228 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ...............................
359
Figure 229 SECURITY > CERTIFICATES > My Certificates > Create (Basic) ....................................
360
Figure 230 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) .............................
361
Figure 231 SECURITY > CERTIFICATES > Trusted CAs ...................................................................
365
Figure 232 SECURITY > CERTIFICATES > Trusted CAs > Details ....................................................
367
Figure 233 SECURITY > CERTIFICATES > Trusted CAs > Import .....................................................
370
Figure 234 SECURITY > CERTIFICATES > Trusted Remote Hosts ....................................................
371
Figure 235 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import .....................................
372
Figure 236 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details .....................................
373
Figure 237 SECURITY > CERTIFICATES > Directory Servers ............................................................
375
Figure 238 SECURITY > CERTIFICATES > Directory Server > Add ...................................................
376
Figure 239 SECURITY > AUTH SERVER > Local User Database ......................................................
380
Figure 240 SECURITY > AUTH SERVER > RADIUS ..........................................................................
381
Figure 241 How NAT Works .................................................................................................................
387
Figure 242 NAT Application With IP Alias ............................................................................................
Figure 243 Port Restricted Cone NAT Example ...................................................................................
388
Figure 244 ADVANCED > NAT > NAT Overview ..................................................................................
390
Figure 245 ADVANCED > NAT > Address Mapping .............................................................................
392
Figure 246 ADVANCED > NAT > Address Mapping > Edit ..................................................................
393
Figure 247 Multiple Servers Behind NAT Example ..............................................................................
396
Figure 248 Port Translation Example ...................................................................................................
397
Figure 249 ADVANCED > NAT > Port Forwarding ...............................................................................
398
Figure 250 Trigger Port Forwarding Process: Example ........................................................................
399
Figure 251 ADVANCED > NAT > Port Triggering .................................................................................
400
Figure 252 Example of Static Routing Topology ...................................................................................
401
Figure 253 ADVANCED > STATIC ROUTE > IP Static Route ..............................................................
402
34
ZyWALL 2WG User’s Guide