ZyXEL Communications G.SHDSL.bis 4-port Security Gateway P-793H User Manual page 24

G.shdsl.bis 4-port security gateway
Table of Contents

Advertisement

List of Figures
Figure 39 LAN > IP > Advanced Setup .................................................................................................. 98
Figure 40 LAN > DHCP Setup ................................................................................................................ 99
Figure 41 LAN > Client List ................................................................................................................... 100
Figure 42 Physical Network & Partitioned Logical Networks ................................................................ 101
Figure 43 LAN > IP Alias ...................................................................................................................... 102
Figure 44 How NAT Works ................................................................................................................... 104
Figure 45 NAT Application With IP Alias .............................................................................................. 105
Figure 46 NAT > General ...................................................................................................................... 106
Figure 47 Multiple Servers Behind NAT Example ................................................................................ 108
Figure 48 NAT > Port Forwarding ......................................................................................................... 109
Figure 49 NAT > Port Forwarding > Edit ...............................................................................................110
Figure 50 NAT > Address Mapping .......................................................................................................111
Figure 51 NAT > Address Mapping > Edit .............................................................................................112
Figure 52 ZyXEL Device Firewall Application ........................................................................................119
Figure 53 Three-Way Handshake ......................................................................................................... 120
Figure 54 SYN Flood ............................................................................................................................ 121
Figure 55 Smurf Attack ......................................................................................................................... 121
Figure 56 Stateful Inspection ................................................................................................................ 123
Figure 57 Ideal Firewall Setup .............................................................................................................. 132
Figure 58 "Triangle Route" Problem ..................................................................................................... 133
Figure 59 IP Alias ................................................................................................................................. 133
Figure 60 Firewall > General ................................................................................................................ 134
Figure 61 Firewall > Rules .................................................................................................................... 135
Figure 62 Firewall > Rules > Add/Edit .................................................................................................. 137
Figure 63 Firewall > Rules > Add/Edit > Edit Customized Services ..................................................... 139
Figure 65 Firewall Example: Rules ....................................................................................................... 141
Figure 66 Edit Custom Port Example ................................................................................................... 141
Figure 67 Firewall Example: Edit Rule: Destination Address .............................................................. 142
Figure 68 Firewall Example: Edit Rule: Select Customized Services ................................................... 143
Figure 69 Firewall Example: Rules: MyService ................................................................................... 144
Figure 70 Firewall > Anti Probing ......................................................................................................... 144
Figure 71 Firewall > Threshold ............................................................................................................. 147
Figure 72 Content Filter > Keyword ...................................................................................................... 149
Figure 73 Content Filter > Schedule ..................................................................................................... 150
Figure 74 Content Filter > Trusted ........................................................................................................ 151
Figure 75 VPN: Example ...................................................................................................................... 153
Figure 76 VPN: IKE SA and IPSec SA ................................................................................................ 154
Figure 77 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ........................................... 155
Figure 79 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................... 156
Figure 80 VPN/NAT Example ............................................................................................................... 158
Figure 81 VPN: Transport and Tunnel Mode Encapsulation ................................................................ 159
24
P-793H User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-793h

Table of Contents