ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Page 16

Advertising
background image

ZyWALL 2 Series User’s Guide

xvi

List of Figures

Figure 8-3 Multiple Servers Behind NAT Example........................................................................................8-6

Figure 8-4 SUA Server ...................................................................................................................................8-7

Figure 8-5 Address Mapping ..........................................................................................................................8-9

Figure 8-6 Address Mapping Rule................................................................................................................8-10

Figure 8-7 Trigger Port Forwarding Example...............................................................................................8-12

Figure 8-8 Trigger Port .................................................................................................................................8-13

Figure 9-1 Example of Static Routing Topology ............................................................................................9-1

Figure 9-2 Static Route Screen .......................................................................................................................9-2

Figure 9-3 Edit IP Static Route .......................................................................................................................9-3

Figure 10-1 ZyWALL Firewall Application .................................................................................................10-3

Figure 10-2 Three-Way Handshake ..............................................................................................................10-5

Figure 10-3 SYN Flood ................................................................................................................................10-5

Figure 10-4 Smurf Attack .............................................................................................................................10-6

Figure 10-5 Stateful Inspection.....................................................................................................................10-8

Figure 11-1 LAN to WAN Traffic.................................................................................................................11-4

Figure 11-2 WAN to LAN Traffic.................................................................................................................11-5

Figure 11-3 Enabling the Firewall ................................................................................................................11-6

Figure 11-4 Creating/Editing A Firewall Rule ..............................................................................................11-9

Figure 11-5 Adding/Editing Source and Destination Addresses ................................................................. 11-11

Figure 11-6 Creating/Editing A Custom Port..............................................................................................11-12

Figure 11-7 Firewall IP Config Screen .......................................................................................................11-14

Figure 11-8 Firewall Rule Edit IP Example................................................................................................11-15

Figure 11-9 Edit Custom Port Example ......................................................................................................11-15

Figure 11-10 MyService Rule Configuration .............................................................................................11-16

Figure 11-11 My Service Example Rule Summary ....................................................................................11-17

Figure 11-12 Attack Alert ...........................................................................................................................11-22

Figure 12-1 Content Filter : General.............................................................................................................12-2

Figure 12-2 Content Filtering Lookup Procedure.........................................................................................12-4

Figure 12-3 Content Filter : Categories ........................................................................................................12-6

Figure 12-4 Content Filter : Customization ................................................................................................12-15

Figure 13-1 Encryption and Decryption .......................................................................................................13-2

Figure 13-2 IPSec Architecture.....................................................................................................................13-3

Figure 13-3 Transport and Tunnel Mode IPSec Encapsulation.....................................................................13-4

Figure 14-1 IPSec Summary Fields ..............................................................................................................14-3

Figure 14-2 VPN Rules.................................................................................................................................14-4

Figure 14-3 NAT Router Between IPSec Routers.........................................................................................14-6

Figure 14-4 VPN Host using Intranet DNS Server Example........................................................................14-7

Figure 14-5 Client-to-Site VPN Example...................................................................................................14-10

Figure 14-6 Site-to-Site VPN Example ......................................................................................................14-11

Figure 14-7 Basic IKE VPN Rule Edit .......................................................................................................14-12

Figure 14-8 Two Phases to Set Up the IPSec SA........................................................................................14-22

Advertising