beautypg.com

ZyXEL Communications ZyWALL 2 Plus User Manual

Page 31

background image

List of Figures

ZyWALL 2 Plus User’s Guide

31

Figure 168 VPN: Example .................................................................................................................... 253
Figure 169 VPN: IKE SA and IPSec SA .............................................................................................. 254
Figure 170 Gateway and Network Policies .......................................................................................... 255
Figure 171 IPSec Fields Summary ..................................................................................................... 255
Figure 172 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 256
Figure 173 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ......................................... 257
Figure 174 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ...................................... 258
Figure 175 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 258
Figure 176 VPN/NAT Example ............................................................................................................. 261
Figure 177 IPSec High Availability ....................................................................................................... 263
Figure 178 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 265
Figure 179 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 271
Figure 180 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 272
Figure 181 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 274
Figure 182 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 279
Figure 183 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 280
Figure 184 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 282
Figure 185 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 283
Figure 186 SECURITY > VPN > SA Monitor ...................................................................................... 286
Figure 187 Overlap in a Dynamic VPN Rule ........................................................................................ 287
Figure 188 Overlap in IP Alias and VPN Remote Networks ................................................................. 287
Figure 189 SECURITY > VPN > Global Setting ................................................................................. 288
Figure 190 Telecommuters Sharing One VPN Rule Example .............................................................. 289
Figure 191 Telecommuters Using Unique VPN Rules Example ........................................................... 290
Figure 192 VPN for Remote Management Example ............................................................................ 292
Figure 193 VPN Topologies .................................................................................................................. 292
Figure 194 Hub-and-spoke VPN Example ........................................................................................... 293
Figure 195 Certificates on Your Computer ........................................................................................... 296
Figure 196 Certificate Details .............................................................................................................. 297
Figure 197 Certificate Configuration Overview ..................................................................................... 297
Figure 198 SECURITY > CERTIFICATES > My Certificates ............................................................... 298
Figure 199 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 300
Figure 200 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 302
Figure 201 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 304
Figure 202 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 305
Figure 203 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 306
Figure 204 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 307
Figure 205 SECURITY > CERTIFICATES > Trusted CAs ....................................................................311
Figure 206 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 312
Figure 207 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 315
Figure 208 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 315
Figure 209 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 317
Figure 210 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 319