ZyXEL Communications Vantage CNM User Manual page 23

Centralized network management
Hide thumbs Also See for Vantage CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
Figure 81 Configuration > NAT > Full Feature > Trigger Port ............................................. 159
Figure 83 Configuration > Static Route ............................................................................... 163
Figure 84 Configuration > Static Route > Edit ..................................................................... 164
Figure 85 Encryption and Decryption .................................................................................. 167
Figure 86 IPSec Architecture .............................................................................................. 168
Figure 87 Transport and Tunnel Mode IPSec Encapsulation .............................................. 169
Figure 88 NAT Router Between IPSec Routers .................................................................. 175
Figure 89 Two Phases to Set Up the IPSec SA .................................................................. 177
Figure 90 Configuration > VPN ........................................................................................... 180
Figure 91 Configuration > VPN > Tunnel IPSec Detail ...................................................... 181
Figure 92 Configuration > VPN > Manual Tunnel IPSec Detail ........................................... 186
Figure 93 Configuration > VPN > NetBIOS ......................................................................... 188
Figure 94 Configuration > VPN > VPN Rules (IKE) ............................................................ 189
Figure 95 Gateway and Network Policies ........................................................................... 190
Figure 96 IPSec Fields Summary ....................................................................................... 190
Figure 97 Configuration > VPN > IKE Policy ....................................................................... 191
Figure 98 Configuration > VPN > IKE IPSec ....................................................................... 197
Figure 99 Configuration > VPN > IKE IPSec > Move .......................................................... 200
Figure 100 Configuration > VPN > Manual-Key IPSec ....................................................... 201
Figure 101 Configuration > VPN > Manual-Key IPSec > Edit ............................................ 203
Figure 102 Configuration > VPN > Global Setting .............................................................. 206
Figure 103 Telecommuters Sharing One VPN Rule Example ............................................. 207
Figure 104 Telecommuters Using Unique VPN Rules Example ......................................... 209
Figure 105 Three-Way Handshake ..................................................................................... 213
Figure 106 SYN Flood ......................................................................................................... 213
Figure 107 Smurf Attack ..................................................................................................... 214
Figure 108 Stateful Inspection ............................................................................................. 216
Figure 110 Configuration > Firewall > DoS Settings .......................................................... 223
Figure 111 Configuration >Firewall > Edit ........................................................................... 225
Figure 112 Configuration >Firewall > IP Address ................................................................ 226
Figure 113 Configuration > Firewall > Firewall Custom Port ............................................... 227
Figure 114 Configuration > Device Log > Log Settings ....................................................... 229
Figure 116 Configuration > ADSL Monitor .......................................................................... 233
Figure 117 Configuration > X Auth > Local User Database ............................................... 235
Figure 118 Configuration > X Auth > RADIUS .................................................................... 236
Figure 119 Configuration > Device Alarms > Current ......................................................... 239
Figure 120 Configuration > Device Alarms > Historical ...................................................... 240
Figure 121 Private DNS Server Example ............................................................................ 244
Figure 122 Configuration > DNS > System ......................................................................... 245
List of Figures
22

Advertisement

Table of Contents
loading

Table of Contents