beautypg.com

ZyXEL Communications 5 Series User Manual

Page 35

background image

ZyWALL 5/35/70 Series User’s Guide

List of Figures

35

Figure 168 VPN: Example ................................................................................................... 323

Figure 169 VPN: IKE SA and IPSec SA ............................................................................. 324

Figure 170 Gateway and Network Policies ........................................................................ 325

Figure 171 IPSec Fields Summary ................................................................................... 325

Figure 172 SECURITY > VPN > VPN Rules (IKE) ............................................................ 326

Figure 173 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ....................... 327

Figure 174 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ..................... 328

Figure 175 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ........................... 328

Figure 176 VPN/NAT Example ............................................................................................ 331

Figure 177 IPSec High Availability ...................................................................................... 333

Figure 178 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ....................... 335

Figure 179 VPN: Transport and Tunnel Mode Encapsulation ............................................. 341

Figure 180 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ......................... 343

Figure 181 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ....................... 347

Figure 182 SECURITY > VPN > VPN Rules (Manual) ...................................................... 349

Figure 183 SECURITY > VPN > VPN Rules (Manual) > Edit ............................................ 350

Figure 184 SECURITY > VPN > SA Monitor .................................................................... 353

Figure 185 SECURITY > VPN > Global Setting ................................................................ 354

Figure 186 Telecommuters Sharing One VPN Rule Example ............................................. 356

Figure 187 Telecommuters Using Unique VPN Rules Example ......................................... 357

Figure 188 VPN for Remote Management Example ........................................................... 358

Figure 189 VPN Topologies ................................................................................................ 359

Figure 190 Hub-and-spoke VPN Example .......................................................................... 360

Figure 191 Certificates on Your Computer .......................................................................... 364

Figure 192 Certificate Details ............................................................................................. 365

Figure 193 Certificate Configuration Overview ................................................................... 365

Figure 194 SECURITY > CERTIFICATES > My Certificates ............................................. 366

Figure 195 SECURITY > CERTIFICATES > My Certificates > Details ............................... 368

Figure 196 SECURITY > CERTIFICATES > My Certificates > Export ................................ 371

Figure 197 SECURITY > CERTIFICATES > My Certificates > Import ................................ 373

Figure 198 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 .............. 373

Figure 199 SECURITY > CERTIFICATES > My Certificates > Create ............................... 374

Figure 200 SECURITY > CERTIFICATES > Trusted CAs .................................................. 377

Figure 201 SECURITY > CERTIFICATES > Trusted CAs > Details ................................... 379

Figure 202 SECURITY > CERTIFICATES > Trusted CAs > Import .................................... 382

Figure 203 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................. 383

Figure 204 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import .................... 384

Figure 205 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ................... 386

Figure 206 SECURITY > CERTIFICATES > Directory Servers .......................................... 388

Figure 207 SECURITY > CERTIFICATES > Directory Server > Add ................................. 389

Figure 208 SECURITY > AUTH SERVER > Local User Database ..................................... 392

Figure 209 SECURITY > AUTH SERVER > RADIUS ........................................................ 393

Figure 210 How NAT Works ................................................................................................ 396