ZyXEL Communications Vantage CNM User Manual page 30

Centralized network management
Hide thumbs Also See for Vantage CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
Table 38 Configuration > WAN > Dial Backup > Edit - ZyWALL ........................................ 130
Table 39 Configuration > WAN > Setup - Prestige - Bridge Mode ..................................... 133
Table 41 Configuration > WAN > Backup - Prestige .......................................................... 138
Table 42 Configuration > WAN Backup > Advanced - Prestige ......................................... 141
Table 43 NAT Definitions .................................................................................................... 144
Table 44 NAT Mapping Types ............................................................................................ 146
Table 45 Configuration > NAT - ZyWALL ........................................................................... 147
Table 46 Configuration > NAT - Prestige ............................................................................ 148
Table 47 Services and Port Numbers ................................................................................. 150
Table 48 Configuration > NAT > SUA Server - ZyWALL .................................................... 152
Table 49 Configuration > NAT > SUA Server - Prestige ..................................................... 154
Table 50 Configuration > NAT > Full Feature > Address Mapping ..................................... 155
Table 52 Configuration > NAT > Full Feature > Trigger Port .............................................. 159
Table 54 Configuration > Static Route ................................................................................ 163
Table 55 Configuration > Static Route > Edit ..................................................................... 164
Table 56 VPN and NAT ...................................................................................................... 170
Table 57 AH and ESP ........................................................................................................ 171
Table 58 VPN and NAT ...................................................................................................... 173
Table 59 Local ID Type and Content Fields ....................................................................... 176
Table 60 Peer ID Type and Content Fields ........................................................................ 176
Table 61 Matching ID Type and Content Configuration Example ....................................... 177
Table 63 Configuration > VPN ............................................................................................ 180
Table 64 Configuration > VPN > Tunnel IPSec Detail ........................................................ 181
Table 65 Configuration > VPN >Manual Tunnel IPSec Detail ............................................ 186
Table 66 Configuration > VPN > NetBIOS ......................................................................... 188
Table 67 Configuration > VPN > VPN Rules (IKE) ............................................................. 189
Table 68 IPSec Fields Summary ........................................................................................ 189
Table 69 Configuration > VPN > IKE Policy ....................................................................... 191
Table 70 Configuration > VPN > IKE IPSec ....................................................................... 197
Table 71 Configuration > VPN > IKE IPSec > Move .......................................................... 200
Table 72 Configuration > VPN > Manual-Key IPSec .......................................................... 201
Table 73 Configuration > VPN > Manual-Key IPSec > Edit ............................................... 203
Table 74 Configuration > VPN > Global Setting ................................................................. 206
Table 75 Telecommuters Sharing One VPN Rule Example ............................................... 207
Table 76 Telecommuters Using Unique VPN Rules Example ............................................ 209
Table 77 ICMP Commands That Trigger Alerts .................................................................. 214
Table 78 Legal NetBIOS Commands ................................................................................. 215
Table 79 Legal SMTP Commands ..................................................................................... 215
29
List of Tables

Advertisement

Table of Contents
loading

Table of Contents