ZyXEL Communications ZYWALL P1 User Manual page 27

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

List of Figures
Figure 168 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 263
Figure 169 SECURITY > AUTH SERVER > Local User Database ...................................................... 266
Figure 170 SECURITY > AUTH SERVER > RADIUS .......................................................................... 267
Figure 171 How NAT Works ................................................................................................................. 272
Figure 172 NAT Application With IP Alias ............................................................................................ 273
Figure 173 Port Restricted Cone NAT Example ................................................................................... 274
Figure 174 ADVANCED > NAT > NAT Overview .................................................................................. 276
Figure 175 ADVANCED > NAT > Address Mapping ............................................................................. 278
Figure 176 ADVANCED > NAT > Address Mapping > Edit .................................................................. 279
Figure 177 Multiple Servers Behind NAT Example .............................................................................. 281
Figure 178 Port Translation Example ................................................................................................... 282
Figure 179 ADVANCED > NAT > Port Forwarding ............................................................................... 283
Figure 180 Trigger Port Forwarding Process: Example ........................................................................ 284
Figure 181 ADVANCED > NAT > Port Triggering ................................................................................. 285
Figure 182 Example of Static Routing Topology ................................................................................... 287
Figure 183 ADVANCED > STATIC ROUTE > IP Static Route .............................................................. 288
Figure 184 ADVANCED > STATIC ROUTE > IP Static Route > Edit .................................................... 289
Figure 185 Secure and Insecure Remote Management From the WAN .............................................. 291
Figure 186 HTTPS Implementation ...................................................................................................... 293
Figure 187 ADVANCED > REMOTE MGMT > WWW .......................................................................... 294
Figure 188 Security Alert Dialog Box (Internet Explorer) ...................................................................... 295
Figure 189 Security Certificate 1 (Netscape) ........................................................................................ 296
Figure 190 Security Certificate 2 (Netscape) ........................................................................................ 296
Figure 191 Example: Lock Denoting a Secure Connection) ................................................................. 297
Figure 192 Replace Certificate ............................................................................................................. 298
Figure 193 Device-specific Certificate .................................................................................................. 298
Figure 194 Common ZyWALL Certificate ............................................................................................. 299
Figure 195 SSH Communication Over the WAN Example ................................................................... 299
Figure 196 How SSH Works ................................................................................................................. 300
Figure 197 ADVANCED > REMOTE MGMT > SSH ............................................................................. 301
Figure 198 SSH Example 1: Store Host Key ........................................................................................ 302
Figure 199 SSH Example 2: Test ........................................................................................................ 302
Figure 200 SSH Example 2: Log in ...................................................................................................... 303
Figure 201 Secure FTP: Firmware Upload Example ............................................................................ 303
Figure 202 ADVANCED > REMOTE MGMT > Telnet .......................................................................... 304
Figure 203 ADVANCED > REMOTE MGMT > FTP ............................................................................. 305
Figure 204 SNMP Management Model ................................................................................................ 307
Figure 205 ADVANCED > REMOTE MGMT > SNMP .......................................................................... 308
Figure 206 ADVANCED > REMOTE MGMT > DNS ............................................................................. 310
Figure 207 ADVANCED > REMOTE MGMT > CNM .............................................................................311
Figure 208 ADVANCED > UPnP .......................................................................................................... 314
Figure 209 ADVANCED > UPnP > Ports .............................................................................................. 315
Figure 210 H.323 ALG Example .......................................................................................................... 324
27
ZyWALL P1 User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents