List of Figures

Figure 168 HTTP Redirect Example .....................................................................................................

262

Figure 169 Network > HTTP Redirect ..................................................................................................

263

Figure 170 Network > HTTP Redirect > Edit ........................................................................................

263

Figure 171 H.323 ALG Example ..........................................................................................................

267

Figure 172 SIP ALG Example .............................................................................................................

267

Figure 173 VoIP Calls from the WAN with Multiple Outgoing Calls ......................................................

268

Figure 174 VoIP with Multiple WAN IP Addresses ...............................................................................

269

Figure 175 Network > ALG ..................................................................................................................

269

Figure 176 WAN to LAN H.323 Peer-to-peer Calls Example ...............................................................

271

Figure 177 Network > Virtual Server > Add ..........................................................................................

271

Figure 178 Firewall > WAN to LAN .......................................................................................................

272

Figure 179 Firewall > WAN > LAN > Add ............................................................................................

272

Figure 180 Object > Address > Add .....................................................................................................

272

Figure 181 Firewall > WAN > LAN > Add ............................................................................................

273

Figure 182 Default Firewall Action .......................................................................................................

277

Figure 183 Blocking All LAN to WAN IRC Traffic Example ..................................................................

280

Figure 184 Limited LAN to WAN IRC Traffic Example ..........................................................................

281

Figure 185 Triangle Route: Using Virtual Interfaces .............................................................................

283

Figure 186 Firewall .............................................................................................................................

284

Figure 187 Firewall > Edit .....................................................................................................................

286

Figure 188 Firewall Example: Select the Traveling Direction of Traffic ................................................

288

Figure 189 Firewall Example: Edit a Firewall Rule 1 ............................................................................

288

Figure 190 Firewall Example: Create an Address Object .....................................................................

289

Figure 191 Firewall Example: Create a Service Object ........................................................................

289

Figure 192 Firewall Example: Edit a Firewall Rule ...............................................................................

289

Figure 193 Firewall Example: MyService Example Rule in Summary ..................................................

290

Figure 194 VPN: Example ....................................................................................................................

291

Figure 195 VPN: IKE SA and IPSec SA ..............................................................................................

292

Figure 196 VPN: Transport and Tunnel Mode Encapsulation ..............................................................

293

Figure 197 VPN Example: NAT for Inbound and Outbound Traffic ......................................................

295

Figure 198 VPN > IPSec VPN > VPN Connection ...............................................................................

297

Figure 199 VPN > IPSec VPN > VPN Connection > Edit (IKE) ...........................................................

299

Figure 200 VPN > IPSec VPN > VPN Connection > Manual Key > Edit ..............................................

303

Figure 201 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .......................................

307

Figure 202 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ....................................

308

Figure 203 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ...........................................

309

Figure 204 VPN/NAT Example ..............................................................................................................

311

Figure 205 VPN > IPSec VPN > VPN Gateway ...................................................................................

312

Figure 206 VPN > IPSec VPN > VPN Gateway > Edit .........................................................................

314

Figure 207 VPN Topologies ..................................................................................................................

318

Figure 208 VPN > IPSec VPN > Concentrator .....................................................................................

319

Figure 209 VPN > IPSec VPN > Concentrator > Edit ...........................................................................

319

Figure 210 Network > IPSec VPN > Concentrator > Edit > Member ....................................................

320

ZyWALL USG 1000 User’s Guide

35