ZyXEL Communications ZyWall 35 User Manual page 22

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide
Remote Node Setup ............................................................................................. 457
33.1 Introduction to Remote Node Setup ...............................................................457
33.2 Remote Node Setup .......................................................................................457
33.3 Remote Node Profile Setup ...........................................................................457
33.4 Edit IP .............................................................................................................462
33.5 Remote Node Filter ........................................................................................464
IP Static Route Setup ........................................................................................... 467
34.1 IP Static Route Setup .....................................................................................467
Chapter 35
Network Address Translation (NAT) ................................................................... 469
35.1 Using NAT ......................................................................................................469
35.2 NAT Setup ......................................................................................................471
35.3 Configuring a Server behind NAT ..................................................................476
35.4 General NAT Examples ..................................................................................479
35.5 Trigger Port Forwarding .................................................................................487
Chapter 36
Introducing the ZyWALL Firewall ....................................................................... 489
36.1 Using ZyWALL SMT Menus ...........................................................................489
20
33.3.1 Ethernet Encapsulation .........................................................................458
33.3.2 PPPoE Encapsulation ...........................................................................459
33.3.2.1 Outgoing Authentication Protocol ................................................460
33.3.2.2 Nailed-Up Connection .................................................................460
33.3.2.3 Metric ..........................................................................................460
33.3.3 PPTP Encapsulation .............................................................................461
35.1.1 SUA (Single User Account) Versus NAT ..............................................469
35.1.2 Applying NAT ........................................................................................469
35.2.1 Address Mapping Sets ..........................................................................472
35.2.1.1 SUA Address Mapping Set .........................................................472
35.2.1.2 User-Defined Address Mapping Sets ..........................................473
35.2.1.3 Ordering Your Rules ....................................................................474
35.4.1 Internet Access Only .............................................................................479
35.5.1 Two Points To Remember About Trigger Ports .....................................487
36.1.1 Activating the Firewall ...........................................................................489

Advertisement

Table of Contents
loading

Table of Contents