ZyXEL Communications ZyXEL ZyWALL 2WG User Manual

Page 43

Advertising
background image

List of Tables

ZyWALL 2WG User’s Guide

43

Table 82 VPN Example: Matching ID Type and Content ..................................................................... 263
Table 83 VPN Example: Mismatching ID Type and Content ............................................................... 263
Table 84 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................................. 269
Table 85 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy .............................................. 277
Table 86 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................ 280
Table 87 SECURITY > VPN > VPN Rules (Manual) ........................................................................... 285
Table 88 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................................. 287
Table 89 SECURITY > VPN > SA Monitor .......................................................................................... 289
Table 90 SECURITY > VPN > Global Setting ...................................................................................... 290
Table 91 Telecommuters Sharing One VPN Rule Example ................................................................. 292
Table 92 Telecommuters Using Unique VPN Rules Example ............................................................. 293
Table 93 SECURITY > CERTIFICATES > My Certificates .................................................................. 300
Table 94 SECURITY > CERTIFICATES > My Certificates > Details ................................................... 302
Table 95 SECURITY > CERTIFICATES > My Certificates > Export .................................................... 305
Table 96 SECURITY > CERTIFICATES > My Certificates > Import .................................................... 307
Table 97 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 .................................. 307
Table 98 SECURITY > CERTIFICATES > My Certificates > Create ................................................... 308
Table 99 SECURITY > CERTIFICATES > Trusted CAs .......................................................................311
Table 100 SECURITY > CERTIFICATES > Trusted CAs > Details ..................................................... 312
Table 101 SECURITY > CERTIFICATES > Trusted CAs Import ......................................................... 315
Table 102 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 316
Table 103 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ...................................... 317
Table 104 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 319
Table 105 SECURITY > CERTIFICATES > Directory Servers ............................................................ 321
Table 106 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 322
Table 107 SECURITY > AUTH SERVER > Local User Database ....................................................... 325
Table 108 SECURITY > AUTH SERVER > RADIUS .......................................................................... 325
Table 109 NAT Definitions ................................................................................................................... 329
Table 110 NAT Mapping Types ............................................................................................................ 333
Table 111 ADVANCED > NAT > NAT Overview ................................................................................... 334
Table 112 ADVANCED > NAT > Address Mapping ............................................................................. 336
Table 113 ADVANCED > NAT > Address Mapping > Edit ................................................................... 338
Table 114 Services and Port Numbers ................................................................................................ 339
Table 115 ADVANCED > NAT > Port Forwarding ................................................................................ 342
Table 116 ADVANCED > NAT > Port Triggering .................................................................................. 344
Table 117 ADVANCED > STATIC ROUTE > IP Static Route ............................................................... 346
Table 118 ADVANCED > STATIC ROUTE > IP Static Route > Edit .................................................... 347
Table 119 ADVANCED > POLICY ROUTE > Policy Route Summary ................................................. 351
Table 120 ADVANCED > POLICY ROUTE > Edit ............................................................................... 352
Table 121 Application and Subnet-based Bandwidth Management Example ..................................... 356
Table 122 Maximize Bandwidth Usage Example ................................................................................. 358
Table 123 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ........................ 358
Table 124 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example ..................... 359

Advertising