List of Figures
Figure 168 HTTP Redirect Example .....................................................................................................
262
Figure 169 Network > HTTP Redirect ..................................................................................................
263
Figure 170 Network > HTTP Redirect > Edit ........................................................................................
Figure 171 H.323 ALG Example ..........................................................................................................
267
Figure 172 SIP ALG Example .............................................................................................................
Figure 173 VoIP Calls from the WAN with Multiple Outgoing Calls ......................................................
268
Figure 174 VoIP with Multiple WAN IP Addresses ...............................................................................
269
Figure 175 Network > ALG ..................................................................................................................
Figure 176 WAN to LAN H.323 Peer-to-peer Calls Example ...............................................................
271
Figure 177 Network > Virtual Server > Add ..........................................................................................
Figure 178 Firewall > WAN to LAN .......................................................................................................
272
Figure 179 Firewall > WAN > LAN > Add ............................................................................................
Figure 180 Object > Address > Add .....................................................................................................
Figure 181 Firewall > WAN > LAN > Add ............................................................................................
273
Figure 182 Default Firewall Action .......................................................................................................
277
Figure 183 Blocking All LAN to WAN IRC Traffic Example ..................................................................
280
Figure 184 Limited LAN to WAN IRC Traffic Example ..........................................................................
281
Figure 185 Triangle Route: Using Virtual Interfaces .............................................................................
283
Figure 186 Firewall .............................................................................................................................
284
Figure 187 Firewall > Edit .....................................................................................................................
286
Figure 188 Firewall Example: Select the Traveling Direction of Traffic ................................................
288
Figure 189 Firewall Example: Edit a Firewall Rule 1 ............................................................................
Figure 190 Firewall Example: Create an Address Object .....................................................................
289
Figure 191 Firewall Example: Create a Service Object ........................................................................
Figure 192 Firewall Example: Edit a Firewall Rule ...............................................................................
Figure 193 Firewall Example: MyService Example Rule in Summary ..................................................
290
Figure 194 VPN: Example ....................................................................................................................
291
Figure 195 VPN: IKE SA and IPSec SA ..............................................................................................
292
Figure 196 VPN: Transport and Tunnel Mode Encapsulation ..............................................................
293
Figure 197 VPN Example: NAT for Inbound and Outbound Traffic ......................................................
295
Figure 198 VPN > IPSec VPN > VPN Connection ...............................................................................
297
Figure 199 VPN > IPSec VPN > VPN Connection > Edit (IKE) ...........................................................
299
Figure 200 VPN > IPSec VPN > VPN Connection > Manual Key > Edit ..............................................
303
Figure 201 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .......................................
307
Figure 202 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ....................................
308
Figure 203 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ...........................................
309
Figure 204 VPN/NAT Example ..............................................................................................................
311
Figure 205 VPN > IPSec VPN > VPN Gateway ...................................................................................
312
Figure 206 VPN > IPSec VPN > VPN Gateway > Edit .........................................................................
314
Figure 207 VPN Topologies ..................................................................................................................
318
Figure 208 VPN > IPSec VPN > Concentrator .....................................................................................
319
Figure 209 VPN > IPSec VPN > Concentrator > Edit ...........................................................................
Figure 210 Network > IPSec VPN > Concentrator > Edit > Member ....................................................
320
ZyWALL USG 1000 User’s Guide
35