ZyXEL Communications ZyWALL USG 300 User Manual page 45

Unified security gateway
Hide thumbs Also See for ZyWALL USG 300:
Table of Contents

Advertisement

List of Tables
Table 82 Network > Routing > Policy Route > Edit .............................................................................. 255
Table 83 Network > Routing > Static Route ......................................................................................... 258
Table 84 Network > Routing > Static Route > Add .............................................................................. 258
Table 85 RIP vs. OSPF ........................................................................................................................ 261
Table 86 Network > Routing Protocol > RIP ........................................................................................ 262
Table 87 OSPF: Redistribution from Other Sources to Each Type of Area ......................................... 265
Table 88 Network > Routing Protocol > OSPF .................................................................................... 267
Table 89 Network > Routing > OSPF > Edit ........................................................................................ 268
Table 90 Network > Zone ..................................................................................................................... 275
Table 91 Network > Zone > Edit .......................................................................................................... 276
Table 92 Network > DDNS ................................................................................................................... 277
Table 93 Network > DDNS ................................................................................................................... 278
Table 94 Network > DDNS > Add ........................................................................................................ 280
Table 95 Network > DDNS > Status .................................................................................................... 282
Table 96 Network > Virtual Server ....................................................................................................... 284
Table 97 Network > Virtual Server > Edit ............................................................................................. 285
Table 98 Network > HTTP Redirect ..................................................................................................... 297
Table 99 Network > HTTP Redirect > Edit ........................................................................................... 298
Table 100 Network > ALG .................................................................................................................... 303
Table 101 Network > IP/MAC Binding > Summary .............................................................................. 308
Table 102 Network > IP/MAC Binding > Edit ....................................................................................... 309
Table 103 Network > IP/MAC Binding > Edit > Add ............................................................................. 310
Table 104 Network > IP/MAC Binding > Exempt List ...........................................................................311
Table 105 Network > IP/MAC Binding > Monitor ..................................................................................311
Table 106 Default Firewall Rules ......................................................................................................... 316
Table 107 Blocking All LAN to WAN IRC Traffic Example ................................................................... 318
Table 108 Limited LAN to WAN IRC Traffic Example 1 ....................................................................... 319
Table 109 Limited LAN to WAN IRC Traffic Example 2 ....................................................................... 320
Table 110 Firewall ................................................................................................................................ 324
Table 111 Firewall > Edit ...................................................................................................................... 326
Table 112 Firewall > Session Limit ...................................................................................................... 328
Table 113 Firewall > Session Limit > Edit ............................................................................................ 329
Table 114 IPSec VPN Application Scenarios ....................................................................................... 335
Table 115 VPN > IPSec VPN > VPN Connection ................................................................................ 337
Table 116 VPN > IPSec VPN > VPN Connection > Edit ...................................................................... 340
Table 117 VPN > IPSec VPN > VPN Connection > Manual Key > Edit ............................................... 344
Table 118 VPN > IPSec VPN > VPN Gateway .................................................................................... 346
Table 119 VPN > IPSec VPN > VPN Gateway > Edit .......................................................................... 348
Table 120 VPN > IPSec VPN > Concentrator ...................................................................................... 353
Table 121 VPN > IPSec VPN > Concentrator > Edit ........................................................................... 353
Table 122 VPN > IPSec VPN > SA Monitor ......................................................................................... 355
Table 123 VPN Example: Matching ID Type and Content ................................................................... 359
Table 124 VPN Example: Mismatching ID Type and Content ............................................................. 359
45
ZyWALL USG 300 User's Guide

Advertisement

Table of Contents
loading

Table of Contents