ZyXEL Communications G.SHDSL.bis 4-port Security Gateway P-793H User Manual

Page 26

Advertising
background image

P-793H User’s Guide

26

List of Figures

Figure 39 LAN > IP Alias ..................................................................................................... 105
Figure 40 How NAT Works .................................................................................................. 108
Figure 41 NAT Application With IP Alias ............................................................................. 109
Figure 42 NAT > General .................................................................................................... 111
Figure 43 Multiple Servers Behind NAT Example ............................................................... 112
Figure 44 NAT > Port Forwarding ....................................................................................... 113
Figure 45 NAT > Port Forwarding > Edit ............................................................................. 114
Figure 46 NAT > Address Mapping ..................................................................................... 115
Figure 47 NAT > Address Mapping > Edit ........................................................................... 116
Figure 48 ZyXEL Device Firewall Application ..................................................................... 121
Figure 49 Three-Way Handshake ....................................................................................... 122
Figure 50 SYN Flood ........................................................................................................... 123
Figure 51 Smurf Attack ....................................................................................................... 124
Figure 52 Stateful Inspection ............................................................................................... 125
Figure 53 Ideal Firewall Setup ............................................................................................ 134
Figure 54 “Triangle Route” Problem .................................................................................... 135
Figure 55 IP Alias ................................................................................................................ 135
Figure 56 Firewall > General ............................................................................................... 136
Figure 57 Firewall > Rules .................................................................................................. 137
Figure 58 Firewall > Rules > Add/Edit ................................................................................. 139
Figure 59 Firewall > Rules > Add/Edit > Edit Customized Services ................................... 141
Figure 60 Firewall > Rules > Add/Edit > Edit Customized Services > Edit ......................... 142
Figure 61 Firewall Example: Rules ..................................................................................... 143
Figure 62 Edit Custom Port Example .................................................................................. 143
Figure 63 Firewall Example: Edit Rule: Destination Address ............................................. 144
Figure 64 Firewall Example: Edit Rule: Select Customized Services ................................. 145
Figure 65 Firewall Example: Rules: MyService .................................................................. 146
Figure 66 Firewall > Anti Probing ........................................................................................ 146
Figure 67 Firewall > Threshold ........................................................................................... 149
Figure 68 Content Filter > Keyword .................................................................................... 151
Figure 69 Content Filter > Schedule ................................................................................... 152
Figure 70 Content Filter > Trusted ...................................................................................... 153
Figure 71 VPN: Example ..................................................................................................... 155
Figure 72 VPN: IKE SA and IPSec SA ............................................................................... 156
Figure 73 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ......................... 157
Figure 74 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ....................... 157
Figure 75 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................. 158
Figure 76 VPN/NAT Example .............................................................................................. 160
Figure 77 VPN: Transport and Tunnel Mode Encapsulation ............................................... 161
Figure 78 VPN > Setup ....................................................................................................... 164
Figure 79 VPN > Setup > Edit ............................................................................................. 166
Figure 80 VPN > Setup > Edit > Advanced ......................................................................... 171
Figure 81 VPN > Setup > Edit > Manual ............................................................................. 174

Advertising