ZyWALL 2 Series User’s Guide

Figure 8-3 Multiple Servers Behind NAT Example........................................................................................

8-6

Figure 8-4 SUA Server ...................................................................................................................................

8-7

Figure 8-5 Address Mapping ..........................................................................................................................

8-9

Figure 8-6 Address Mapping Rule................................................................................................................

8-10

Figure 8-7 Trigger Port Forwarding Example...............................................................................................

8-12

Figure 8-8 Trigger Port .................................................................................................................................

8-13

Figure 9-1 Example of Static Routing Topology ............................................................................................

9-1

Figure 9-2 Static Route Screen .......................................................................................................................

9-2

Figure 9-3 Edit IP Static Route .......................................................................................................................

9-3

Figure 10-1 ZyWALL Firewall Application .................................................................................................

10-3

Figure 10-2 Three-Way Handshake ..............................................................................................................

10-5

Figure 10-3 SYN Flood ................................................................................................................................

10-5

Figure 10-4 Smurf Attack .............................................................................................................................

10-6

Figure 10-5 Stateful Inspection.....................................................................................................................

10-8

Figure 11-1 LAN to WAN Traffic.................................................................................................................

11-4

Figure 11-2 WAN to LAN Traffic.................................................................................................................

11-5

Figure 11-3 Enabling the Firewall ................................................................................................................

11-6

Figure 11-4 Creating/Editing A Firewall Rule ..............................................................................................

11-9

Figure 11-5 Adding/Editing Source and Destination Addresses .................................................................

11-11

Figure 11-6 Creating/Editing A Custom Port..............................................................................................

11-12

Figure 11-7 Firewall IP Config Screen .......................................................................................................

11-14

Figure 11-8 Firewall Rule Edit IP Example................................................................................................

11-15

Figure 11-9 Edit Custom Port Example......................................................................................................

11-15

Figure 11-10 MyService Rule Configuration .............................................................................................

11-16

Figure 11-11 My Service Example Rule Summary ....................................................................................

11-17

Figure 11-12 Attack Alert ...........................................................................................................................

11-22

Figure 12-1 Content Filter : General.............................................................................................................

12-2

Figure 12-2 Content Filtering Lookup Procedure.........................................................................................

12-4

Figure 12-3 Content Filter : Categories ........................................................................................................

12-6

Figure 12-4 Content Filter : Customization ................................................................................................

12-15

Figure 13-1 Encryption and Decryption .......................................................................................................

13-2

Figure 13-2 IPSec Architecture.....................................................................................................................

13-3

Figure 13-3 Transport and Tunnel Mode IPSec Encapsulation.....................................................................

13-4

Figure 14-1 IPSec Summary Fields ..............................................................................................................

14-3

Figure 14-2 VPN Rules.................................................................................................................................

14-4

Figure 14-3 NAT Router Between IPSec Routers.........................................................................................

14-6

Figure 14-4 VPN Host using Intranet DNS Server Example........................................................................

14-7

Figure 14-5 Client-to-Site VPN Example...................................................................................................

14-10

Figure 14-6 Site-to-Site VPN Example ......................................................................................................

14-11

Figure 14-7 Basic IKE VPN Rule Edit .......................................................................................................

14-12

Figure 14-8 Two Phases to Set Up the IPSec SA........................................................................................

14-22

xvi

List of Figures