ZyWALL Series Internet Security Gateway
xxii
List of Figures
Figure 8-1 WAN Setup: Route........................................................................................................................8-2
Figure 8-2 Ethernet Encapsulation..................................................................................................................8-3
Figure 8-3 PPPoE Encapsulation....................................................................................................................8-5
Figure 8-4 PPTP Encapsulation ......................................................................................................................8-7
Figure 8-5 IP Setup .........................................................................................................................................8-9
Figure 8-6 MAC Setup .................................................................................................................................8-12
Figure 8-7 Traffic Redirect WAN Setup .......................................................................................................8-12
Figure 8-8 Traffic Redirect LAN Setup ........................................................................................................8-13
Figure 8-9 Traffic Redirect ...........................................................................................................................8-14
Figure 8-10 Dial Backup Setup ....................................................................................................................8-16
Figure 8-11 Advanced Setup.........................................................................................................................8-21
Figure 9-1 How NAT Works...........................................................................................................................9-3
Figure 9-2 NAT Application With IP Alias .....................................................................................................9-4
Figure 9-3 Multiple Servers Behind NAT Example........................................................................................9-8
Figure 9-4 SUA Server ...................................................................................................................................9-9
Figure 9-5 Address Mapping ........................................................................................................................9-10
Figure 9-6Address Mapping Edit..................................................................................................................9-12
Figure 9-7 Trigger Port Forwarding Process: Example ................................................................................9-14
Figure 9-8 Trigger Port .................................................................................................................................9-15
Figure 10-1 Example of Static Routing Topology ........................................................................................10-1
Figure 10-2 IP Static Route...........................................................................................................................10-2
Figure 10-3 Edit IP Static Route ...................................................................................................................10-3
Figure 11-1 ZyWALL Firewall Application..................................................................................................11-3
Figure 11-2 Three-Way Handshake ..............................................................................................................11-5
Figure 11-3 SYN Flood ................................................................................................................................11-5
Figure 11-4 Smurf Attack .............................................................................................................................11-6
Figure 11-5 Stateful Inspection.....................................................................................................................11-8
Figure 12-1 LAN to WAN Traffic.................................................................................................................12-4
Summary of Contents for Internet Security Gateway ZyWALL 100
Page 1: ...ZyWALL 10W 30W 50 100 Internet Security Gateway User s Guide Version 3 62 February 2004 ...
Page 8: ......
Page 32: ......
Page 42: ......
Page 60: ......
Page 74: ......
Page 92: ......
Page 102: ......
Page 104: ......
Page 108: ......
Page 124: ...ZyWALL Series Internet Security Gateway 8 16 WAN Screens Figure 8 10 Dial Backup Setup ...
Page 132: ......
Page 134: ......
Page 156: ......
Page 170: ......
Page 218: ......
Page 224: ......
Page 235: ...ZyWALL Series Internet Security Gateway VPN Screens 15 11 Figure 15 5 VPN IKE ...
Page 260: ......
Page 262: ......
Page 282: ...ZyWALL Series Internet Security Gateway 16 20 Certificates Figure 16 9 Trusted CA Details ...
Page 298: ......
Page 300: ......
Page 308: ......
Page 350: ......
Page 351: ...Logs IX Part IX Logs This part provides information and instructions for the logs and reports ...
Page 352: ......
Page 356: ...ZyWALL Series Internet Security Gateway 20 4 Log Screens Figure 20 2 Log Settings ...
Page 364: ......
Page 365: ...Maintenance X Part X Maintenance This part covers the maintenance screens ...
Page 366: ......
Page 378: ......
Page 380: ......
Page 406: ......
Page 420: ......
Page 428: ......
Page 446: ......
Page 466: ......
Page 490: ......
Page 504: ......
Page 524: ......
Page 536: ......
Page 538: ......
Page 554: ......
Page 574: ......
Page 580: ......
Page 586: ......
Page 588: ......
Page 590: ......
Page 592: ......
Page 604: ......
Page 608: ......
Page 610: ......
Page 614: ......
Page 624: ......
Page 634: ......
Page 636: ......
Page 648: ......
Page 654: ......
Page 680: ......
Page 682: ......