ZyXEL Communications ZyWall 35 User Manual page 22

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide
Remote Node Setup ............................................................................................. 459
33.1 Introduction to Remote Node Setup ...............................................................459
33.2 Remote Node Setup .......................................................................................459
33.3 Remote Node Profile Setup ...........................................................................459
33.4 Edit IP .............................................................................................................464
33.5 Remote Node Filter ........................................................................................466
IP Static Route Setup ........................................................................................... 469
34.1 IP Static Route Setup .....................................................................................469
Chapter 35
Network Address Translation (NAT) ................................................................... 471
35.1 Using NAT ......................................................................................................471
35.2 NAT Setup ......................................................................................................473
35.3 Configuring a Server behind NAT ..................................................................478
35.4 General NAT Examples ..................................................................................481
35.5 Trigger Port Forwarding .................................................................................489
Chapter 36
Introducing the ZyWALL Firewall ....................................................................... 491
36.1 Using ZyWALL SMT Menus ...........................................................................491
20
33.3.1 Ethernet Encapsulation .........................................................................460
33.3.2 PPPoE Encapsulation ...........................................................................461
33.3.2.1 Outgoing Authentication Protocol ................................................462
33.3.2.2 Nailed-Up Connection .................................................................462
33.3.2.3 Metric ..........................................................................................462
33.3.3 PPTP Encapsulation .............................................................................463
35.1.1 SUA (Single User Account) Versus NAT ..............................................471
35.1.2 Applying NAT ........................................................................................471
35.2.1 Address Mapping Sets ..........................................................................474
35.2.1.1 SUA Address Mapping Set .........................................................474
35.2.1.2 User-Defined Address Mapping Sets ..........................................475
35.2.1.3 Ordering Your Rules ....................................................................476
35.4.1 Internet Access Only .............................................................................481
35.5.1 Two Points To Remember About Trigger Ports .....................................489
36.1.1 Activating the Firewall ...........................................................................491

Advertisement

Table of Contents
loading

Table of Contents