ZyXEL Communications ZyXEL ZyWALL 2WG User Manual
Page 33
List of Figures
ZyWALL 2WG User’s Guide
33
Figure 168 Certificates on Your Computer ........................................................................................... 298
Figure 169 Certificate Details .............................................................................................................. 299
Figure 170 Certificate Configuration Overview ..................................................................................... 299
Figure 171 SECURITY > CERTIFICATES > My Certificates ............................................................... 300
Figure 172 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 302
Figure 173 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 305
Figure 174 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 307
Figure 175 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 307
Figure 176 SECURITY > CERTIFICATES > My Certificates > Create ................................................. 308
Figure 177 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 310
Figure 178 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 312
Figure 179 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 315
Figure 180 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 316
Figure 181 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 317
Figure 182 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 318
Figure 183 SECURITY > CERTIFICATES > Directory Servers ............................................................ 320
Figure 184 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 321
Figure 185 SECURITY > AUTH SERVER > Local User Database ...................................................... 324
Figure 186 SECURITY > AUTH SERVER > RADIUS .......................................................................... 325
Figure 187 How NAT Works ................................................................................................................. 331
Figure 188 NAT Application With IP Alias ............................................................................................ 331
Figure 189 Port Restricted Cone NAT Example ................................................................................... 332
Figure 190 ADVANCED > NAT > NAT Overview .................................................................................. 334
Figure 191 ADVANCED > NAT > Address Mapping ............................................................................. 336
Figure 192 ADVANCED > NAT > Address Mapping > Edit .................................................................. 338
Figure 193 Multiple Servers Behind NAT Example .............................................................................. 340
Figure 194 Port Translation Example ................................................................................................... 341
Figure 195 ADVANCED > NAT > Port Forwarding ............................................................................... 342
Figure 196 Trigger Port Forwarding Process: Example ........................................................................ 343
Figure 197 ADVANCED > NAT > Port Triggering ................................................................................. 344
Figure 198 Example of Static Routing Topology ................................................................................... 345
Figure 199 ADVANCED > STATIC ROUTE > IP Static Route .............................................................. 346
Figure 200 ADVANCED > STATIC ROUTE > IP Static Route > Edit .................................................... 347
Figure 201 ADVANCED > POLICY ROUTE > Policy Route Summary ................................................ 350
Figure 202 Edit IP Policy Route ............................................................................................................ 352
Figure 203 Subnet-based Bandwidth Management Example .............................................................. 356
Figure 204 ADVANCED > BW MGMT > Summary .............................................................................. 362
Figure 205 ADVANCED > BW MGMT > Class Setup .......................................................................... 363
Figure 206 ADVANCED > BW MGMT > Class Setup > Add Sub-Class .............................................. 365
Figure 207 ADVANCED > BW MGMT > Class Setup > Statistics ........................................................ 368
Figure 208 ADVANCED > BW MGMT > Monitor ................................................................................. 369
Figure 209 Private DNS Server Example ............................................................................................. 373
Figure 210 ADVANCED > DNS > System DNS ................................................................................... 374