ZyWALL 5 Internet Security Appliance
29.1
IP Static Route Setup ................................................................................................... 29-1
30.1
Using NAT ................................................................................................................... 30-1
30.2
NAT Setup ................................................................................................................... 30-2
30.3
30.4
General NAT Examples ............................................................................................... 30-7
30.5
Trigger Port Forwarding............................................................................................. 30-13
31.1
Using ZyWALL SMT Menus ...................................................................................... 31-1
32.1
Introduction to Filters................................................................................................... 32-1
32.2
Configuring a Filter Set................................................................................................ 32-2
32.3
Example Filter.............................................................................................................. 32-9
32.4
Filter Types and NAT ................................................................................................ 32-11
32.5
Firewall Versus Filters ............................................................................................... 32-11
32.6
Applying a Filter ........................................................................................................ 32-11
33.1
SNMP Configuration ................................................................................................... 33-1
33.2
SNMP Traps................................................................................................................. 33-1
SMT System Maintenance .............................................................................................................. XIII
34.1
34.2
System Status ............................................................................................................... 34-1
34.3
34.4
Log and Trace .............................................................................................................. 34-4
34.5
Diagnostic .................................................................................................................... 34-8
35.1
Introduction .................................................................................................................. 35-1
35.2
Filename Conventions.................................................................................................. 35-1
35.3
Backup Configuration .................................................................................................. 35-2
35.4
Restore Configuration .................................................................................................. 35-6
35.5
36.1
36.2
Call Control Support .................................................................................................... 36-2
36.3
Time and Date Setting.................................................................................................. 36-4
Chapter 37 Remote Management............................................................................................... 37-1
37.1
Remote Management ................................................................................................... 37-1
SMT Advanced Management ......................................................................................................... XIV
Chapter 38 Call Scheduling ........................................................................................................ 38-1
38.1
Chapter 39 VPN/IPSec Setup...................................................................................................... 39-1
39.1
Introduction .................................................................................................................. 39-1
39.2
IPSec Summary Screen ................................................................................................ 39-2
39.3
IPSec Setup .................................................................................................................. 39-4
39.4
IKE Setup ..................................................................................................................... 39-8
39.5
Manual Setup ............................................................................................................. 39-11
Chapter 40 SA Monitor ............................................................................................................... 40-1
40.1
Introduction .................................................................................................................. 40-1
40.2
Using SA Monitor ........................................................................................................ 40-1
xii
Table of Content