ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual page 17

Internet security gateway
Hide thumbs Also See for Internet Security Gateway ZyWALL 2 Series:
Table of Contents

Advertisement

ZyWALL 2 Series User's Guide
Figure 14-9 Advanced
................................................................................................ 14-25
IKE VPN Rule Setup
Figure 14-10 Manual VPN Rule Setup ...................................................................................................... 14-29
Figure 14-11 VPN SA Monitor .................................................................................................................. 14-33
Figure 14-12 VPN Global Setting.............................................................................................................. 14-34
Figure 14-13 Telecommuters Sharing One VPN Rule Example ................................................................ 14-36
Figure 14-14 Telecommuters Using Unique VPN Rules Example ............................................................ 14-37
Figure 15-1 Certificate Configuration Overview ......................................................................................... 15-2
Figure 15-2 My Certificates ......................................................................................................................... 15-3
Figure 15-3 My Certificate Import............................................................................................................... 15-6
Figure 15-4 My Certificate Create ............................................................................................................... 15-7
Figure 15-5 My Certificate Details .............................................................................................................15-11
Figure 15-6 Trusted CAs............................................................................................................................ 15-15
Figure 15-7 Trusted CA Import.................................................................................................................. 15-17
Figure 15-8 Trusted CA Details ................................................................................................................. 15-18
Figure 15-9 Trusted Remote Hosts ............................................................................................................ 15-22
Figure 15-10 Trusted Remote Host Import ................................................................................................ 15-25
Figure 15-11 Trusted Remote Host Details ................................................................................................ 15-26
Figure 15-12 Directory Servers.................................................................................................................. 15-29
Figure 15-13 Directory Server Add............................................................................................................ 15-30
Figure 16-1 Local User Database................................................................................................................. 16-2
Figure 16-2 RADIUS ................................................................................................................................... 16-4
Figure 17-1 HTTPS Implementation............................................................................................................ 17-3
Figure 17-2 WWW....................................................................................................................................... 17-4
Figure 17-3 Security Alert Dialog Box (Internet Explorer) ......................................................................... 17-6
Figure 17-4 Security Certificate 1 (Netscape).............................................................................................. 17-7
Figure 17-5 Security Certificate 2 (Netscape).............................................................................................. 17-8
Figure 17-6 Login Screen (Internet Explorer)............................................................................................ 17-10
Figure 17-7 Login Screen (Netscape) .........................................................................................................17-11
Figure 17-8 Replace Certificate ................................................................................................................. 17-12
Figure 17-9 Device-specific Certificate ..................................................................................................... 17-12
Figure 17-10 Common ZyWALL Certificate ............................................................................................. 17-13
Figure 17-11 SSH Communication Example ............................................................................................. 17-14
Figure 17-12How SSH Works.................................................................................................................... 17-14
Figure 17-13 SSH ...................................................................................................................................... 17-15
Figure 17-14 SSH Example 1: Store Host Key .......................................................................................... 17-17
Figure 17-15 SSH Example 2: Test............................................................................................................ 17-17
Figure 17-16SSH Example 2: Log in......................................................................................................... 17-18
Figure 17-17 Secure FTP: Firmware Upload Example.............................................................................. 17-19
Figure 17-18 Telnet Configuration on a TCP/IP Network ......................................................................... 17-19
Figure 17-19 Telnet .................................................................................................................................... 17-20
Figure 17-20 FTP ....................................................................................................................................... 17-21
List of Figures
xvii

Advertisement

Table of Contents
loading

Table of Contents