ZyXEL Communications ZyWALL 5 User Manual page 18

Internet security appliance
Hide thumbs Also See for ZyWALL 5:
Table of Contents

Advertisement

ZyWALL 5 Internet Security Appliance
Figure 25-5 Menu 3.2.1: IP Alias Setup ............................................................................................ 25-4
Figure 25-6 Menu 3.5: Wireless LAN Setup ..................................................................................... 25-5
Figure 25-7 Menu 3.5.1: WLAN MAC Address Filter...................................................................... 25-7
Figure 26-1 Menu 4: Internet Access Setup (Ethernet) ..................................................................... 26-1
Figure 26-2 Internet Access Setup (PPTP) ........................................................................................ 26-3
Figure 26-3 Internet Access Setup (PPPoE) ...................................................................................... 26-3
Figure 27-1 Menu 5: DMZ Setup ..................................................................................................... 27-1
Figure 27-2 Menu 5.1: DMZ Port Filter Setup .................................................................................. 27-1
Figure 27-3 Menu 5: TCP/IP Setup ................................................................................................... 27-2
Figure 27-4 Menu 5.2: TCP/IP Setup ................................................................................................ 27-2
Figure 27-5 Menu 5.2.1: IP Alias Setup ............................................................................................ 27-3
Figure 28-1 Menu 11 Remote Node Setup ........................................................................................ 28-1
Figure 28-3 Menu 11.1: Remote Node Profile for PPPoE Encapsulation ......................................... 28-3
Figure 28-4 Menu 11.1: Remote Node Profile for PPTP Encapsulation ........................................... 28-5
Figure 28-6 Menu 11.5: Remote Node Filter (Ethernet Encapsulation) ............................................ 28-7
Figure 28-8 Menu 11.6: Traffic Redirect Setup................................................................................. 28-8
Figure 29-1 Menu 12: IP Static Route Setup ..................................................................................... 29-1
Figure 29-2 Menu 12. 1: Edit IP Static Route.................................................................................... 29-2
Figure 30-1 Menu 4: Applying NAT for Internet Access.................................................................. 30-1
Figure 30-2 Menu 11.3: Applying NAT to the Remote Node ........................................................... 30-2
Figure 30-3 Menu 15: NAT Setup ..................................................................................................... 30-3
Figure 30-4 Menu 15.1: Address Mapping Sets ................................................................................ 30-3
Figure 30-5 Menu 15.1.255: SUA Address Mapping Rules.............................................................. 30-3
Figure 30-6 Menu 15.1.1: First Set .................................................................................................... 30-4
Figure 30-8 Menu 15.2: NAT Server Setup....................................................................................... 30-7
Figure 30-9 Server Behind NAT Example ........................................................................................ 30-7
Figure 30-10 NAT Example 1 ........................................................................................................... 30-8
Figure 30-11 Menu 4: Internet Access & NAT Example .................................................................. 30-8
Figure 30-12 NAT Example 2 ........................................................................................................... 30-8
Figure 30-13 Menu 15.2: Specifying an Inside Server ...................................................................... 30-9
Figure 30-14 NAT Example 3 ......................................................................................................... 30-10
Figure 30-15 Example 3: Menu 11.3 ............................................................................................... 30-10
Figure 30-16 Example 3: Menu 15.1.1.1 ......................................................................................... 30-11
Figure 30-17 Example 3: Final Menu 15.1.1 ................................................................................... 30-11
Figure 30-18 Example 3: Menu 15.2 ............................................................................................... 30-12
Figure 30-19 NAT Example 4 ......................................................................................................... 30-12
Figure 30-20 Example 4: Menu 15.1.1.1: Address Mapping Rule .................................................. 30-13
Figure 30-21 Example 4: Menu 15.1.1: Address Mapping Rules.................................................... 30-13
Figure 30-22 Menu 15.3: Trigger Port Setup................................................................................... 30-14
Figure 31-1 Menu 21: Filter and Firewall Setup................................................................................ 31-1
Figure 31-2 Menu 21.2: Firewall Setup ............................................................................................. 31-1
Figure 32-1 Outgoing Packet Filtering Process ................................................................................. 32-1
Figure 32-2 Filter Rule Process ......................................................................................................... 32-2
Figure 32-3 Menu 21: Filter and Firewall Setup................................................................................ 32-3
Figure 32-4 Menu 21.1: Filter Set Configuration .............................................................................. 32-3
Figure 32-5 Menu 21.1.1.1: TCP/IP Filter Rule ................................................................................ 32-5
Figure 32-6 Executing an IP Filter..................................................................................................... 32-7
xviii
List of Figures

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents