beautypg.com

ZyXEL Communications ZyWALL 2 Plus User Manual

Page 32

background image

List of Figures

ZyWALL 2 Plus User’s Guide

32

Figure 211 SECURITY > CERTIFICATES > Directory Servers ............................................................ 320
Figure 212 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 321
Figure 213 SECURITY > AUTH SERVER > Local User Database ...................................................... 325
Figure 214 SECURITY > AUTH SERVER > RADIUS .......................................................................... 326
Figure 215 How NAT Works ................................................................................................................. 333
Figure 216 NAT Application With IP Alias ............................................................................................ 333
Figure 217 Port Restricted Cone NAT Example ................................................................................... 334
Figure 218 ADVANCED > NAT > NAT Overview .................................................................................. 336
Figure 219 ADVANCED > NAT > Address Mapping ............................................................................. 338
Figure 220 ADVANCED > NAT > Address Mapping > Edit .................................................................. 339
Figure 221 Multiple Servers Behind NAT Example .............................................................................. 341
Figure 222 Port Translation Example ................................................................................................... 342
Figure 223 ADVANCED > NAT > Port Forwarding ............................................................................... 343
Figure 224 Trigger Port Forwarding Process: Example ........................................................................ 344
Figure 225 ADVANCED > NAT > Port Triggering ................................................................................. 345
Figure 226 Example of Static Routing Topology ................................................................................... 347
Figure 227 ADVANCED > STATIC ROUTE > IP Static Route .............................................................. 348
Figure 228 ADVANCED > STATIC ROUTE > IP Static Route > Edit .................................................... 349
Figure 229 Subnet-based Bandwidth Management Example .............................................................. 352
Figure 230 ADVANCED > BW MGMT > Summary .............................................................................. 357
Figure 231 ADVANCED > BW MGMT > Class Setup .......................................................................... 358
Figure 232 ADVANCED > BW MGMT > Class Setup > Add Sub-Class .............................................. 360
Figure 233 ADVANCED > BW MGMT > Class Setup > Statistics ........................................................ 362
Figure 234 ADVANCED > BW MGMT > Monitor ................................................................................. 363
Figure 235 Private DNS Server Example ............................................................................................. 367
Figure 236 ADVANCED > DNS > System DNS ................................................................................... 367
Figure 237 ADVANCED > DNS > Add (Address Record) .................................................................... 369
Figure 238 ADVANCED > DNS > Insert (Name Server Record) .......................................................... 370
Figure 239 ADVANCED > DNS > Cache ............................................................................................. 371
Figure 240 ADVANCED > DNS > DHCP .............................................................................................. 373
Figure 241 ADVANCED > DNS > DDNS .............................................................................................. 375
Figure 242 Secure and Insecure Remote Management From the WAN .............................................. 377
Figure 243 HTTPS Implementation ...................................................................................................... 379
Figure 244 ADVANCED > REMOTE MGMT > WWW .......................................................................... 379
Figure 245 Security Alert Dialog Box (Internet Explorer) ...................................................................... 381
Figure 246 Security Certificate 1 (Netscape) ........................................................................................ 382
Figure 247 Security Certificate 2 (Netscape) ........................................................................................ 382
Figure 248 Example: Lock Denoting a Secure Connection ................................................................. 383
Figure 249 Replace Certificate ............................................................................................................. 384
Figure 250 Device-specific Certificate .................................................................................................. 384
Figure 251 Common ZyWALL Certificate ............................................................................................. 384
Figure 252 SSH Communication Over the WAN Example .................................................................. 385
Figure 253 How SSH Works ................................................................................................................. 385