ZyXEL Communications NBG410W3G User Manual
Page 24

List of Figures
NBG410W3G Series User’s Guide
24
Figure 125 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 204
Figure 126 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 205
Figure 127 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 206
Figure 128 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 210
Figure 129 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 212
Figure 130 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 215
Figure 131 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 216
Figure 132 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 217
Figure 133 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 218
Figure 134 SECURITY > CERTIFICATES > Directory Servers ............................................................ 220
Figure 135 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 221
Figure 136 How NAT Works ................................................................................................................. 227
Figure 137 NAT Application With IP Alias ............................................................................................ 228
Figure 138 Port Restricted Cone NAT Example ................................................................................... 229
Figure 139 ADVANCED > NAT > NAT Overview .................................................................................. 231
Figure 140 ADVANCED > NAT > Address Mapping ............................................................................. 233
Figure 141 ADVANCED > NAT > Address Mapping > Edit .................................................................. 234
Figure 142 Multiple Servers Behind NAT Example .............................................................................. 237
Figure 143 Port Translation Example ................................................................................................... 238
Figure 144 ADVANCED > NAT > Port Forwarding ............................................................................... 239
Figure 145 Trigger Port Forwarding Process: Example ........................................................................ 240
Figure 146 ADVANCED > NAT > Port Triggering ................................................................................. 241
Figure 147 Example of Static Routing Topology ................................................................................... 243
Figure 148 ADVANCED > STATIC ROUTE > IP Static Route .............................................................. 244
Figure 149 ADVANCED > STATIC ROUTE > IP Static Route > Edit .................................................... 245
Figure 150 ADVANCED > DNS > System DNS ................................................................................... 249
Figure 151 ADVANCED > DNS > Add (Address Record) .................................................................... 250
Figure 152 ADVANCED > DNS > Insert (Name Server Record) .......................................................... 251
Figure 153 ADVANCED > DNS > Cache ............................................................................................. 253
Figure 154 ADVANCED > DNS > DHCP .............................................................................................. 254
Figure 155 ADVANCED > DNS > DDNS .............................................................................................. 256
Figure 156 Secure and Insecure Remote Management From the WAN .............................................. 259
Figure 157 HTTPS Implementation ...................................................................................................... 261
Figure 158 ADVANCED > REMOTE MGMT > WWW .......................................................................... 262
Figure 159 Security Alert Dialog Box (Internet Explorer) ...................................................................... 263
Figure 160 Security Certificate 1 (Netscape) ........................................................................................ 264
Figure 161 Security Certificate 2 (Netscape) ........................................................................................ 264
Figure 162 Example: Lock Denoting a Secure Connection .................................................................. 265
Figure 163 Replace Certificate ............................................................................................................. 266
Figure 164 Device-specific Certificate .................................................................................................. 266
Figure 165 Common ZyXEL Device Certificate .................................................................................... 267
Figure 166 SSH Communication Over the WAN Example .................................................................. 267
Figure 167 How SSH Works ................................................................................................................. 268