ZyXEL Communications ZYWALL P1 User Manual page 26

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

List of Figures
Figure 125 VPN: Example .................................................................................................................... 201
Figure 126 VPN: IKE SA and IPSec SA .............................................................................................. 202
Figure 127 Gateway and Network Policies .......................................................................................... 203
Figure 128 IPSec Fields Summary ..................................................................................................... 203
Figure 129 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 204
Figure 132 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 207
Figure 133 VPN/NAT Example ............................................................................................................. 209
Figure 134 IPSec High Availability ........................................................................................................211
Figure 135 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 213
Figure 136 Local and Remote Network IP Address Overlap ................................................................ 219
Figure 137 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 220
Figure 138 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 221
Figure 139 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 222
Figure 140 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 224
Figure 142 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 230
Figure 143 VPN Rule Configured ......................................................................................................... 231
Figure 144 VPN Dial ............................................................................................................................. 231
Figure 145 VPN Tunnel Established ..................................................................................................... 231
Figure 146 IKE/IPSec Debug Example ............................................................................................... 233
Figure 147 SECURITY > VPN > SA Monitor ...................................................................................... 234
Figure 148 SECURITY > VPN > Global Setting ................................................................................. 234
Figure 149 Telecommuters Sharing One VPN Rule Example .............................................................. 236
Figure 150 Telecommuters Using Unique VPN Rules Example ........................................................... 237
Figure 151 VPN for Remote Management Example ............................................................................ 238
Figure 152 Certificates on Your Computer ........................................................................................... 240
Figure 153 Certificate Details .............................................................................................................. 241
Figure 154 Certificate Configuration Overview ..................................................................................... 241
Figure 155 SECURITY > CERTIFICATES > My Certificates ............................................................... 242
Figure 156 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 244
Figure 157 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 247
Figure 158 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 248
Figure 160 SECURITY > CERTIFICATES > My Certificates > Create ................................................. 250
Figure 161 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 252
Figure 162 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 254
Figure 163 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 257
Figure 164 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 258
Figure 167 SECURITY > CERTIFICATES > Directory Servers ............................................................ 262
26
ZyWALL P1 User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents