List of Figures
ZyWALL 2 Plus User’s Guide
30
Figure 211 SECURITY > AUTH SERVER > Local User Database
......................................................
325
Figure 212 SECURITY > AUTH SERVER > RADIUS
..........................................................................
326
Figure 213 ADVANCED > NAT > NAT Overview
..................................................................................
333
Figure 214 ADVANCED > NAT > Address Mapping
.............................................................................
334
Figure 215 ADVANCED > NAT > Address Mapping > Edit
..................................................................
335
Figure 216 Multiple Servers Behind NAT Example
..............................................................................
337
Figure 217 Port Translation Example
...................................................................................................
338
Figure 218 ADVANCED > NAT > Port Forwarding
...............................................................................
339
Figure 219 Trigger Port Forwarding Process: Example
........................................................................
340
Figure 220 ADVANCED > NAT > Port Triggering
.................................................................................
341
Figure 221 How NAT Works
.................................................................................................................
343
Figure 222 NAT Application With IP Alias
............................................................................................
344
Figure 223 Port Restricted Cone NAT Example
...................................................................................
345
Figure 224 Example of Static Routing Topology
...................................................................................
347
Figure 225 ADVANCED > STATIC ROUTE > IP Static Route
..............................................................
348
Figure 226 ADVANCED > STATIC ROUTE > IP Static Route > Edit
....................................................
349
Figure 227 Subnet-based Bandwidth Management Example
..............................................................
352
Figure 228 ADVANCED > BW MGMT > Summary
..............................................................................
355
Figure 229 ADVANCED > BW MGMT > Class Setup
..........................................................................
358
Figure 230 ADVANCED > BW MGMT > Class Setup > Add Sub-Class
..............................................
360
Figure 231 ADVANCED > BW MGMT > Class Setup > Statistics
........................................................
363
Figure 232 ADVANCED > BW MGMT > Monitor
.................................................................................
364
Figure 233 Private DNS Server Example
.............................................................................................
367
Figure 234 ADVANCED > DNS > System DNS
...................................................................................
368
Figure 235 ADVANCED > DNS > Add (Address Record)
....................................................................
369
Figure 236 ADVANCED > DNS > Insert (Name Server Record)
..........................................................
370
Figure 237 ADVANCED > DNS > Cache
.............................................................................................
371
Figure 238 ADVANCED > DNS > DHCP
..............................................................................................
372
Figure 239 ADVANCED > DNS > DDNS
..............................................................................................
374
Figure 240 Secure and Insecure Remote Management From the WAN
..............................................
377
Figure 241 Security Alert Dialog Box (Internet Explorer)
......................................................................
379
Figure 242 Security Certificate 1 (Netscape)
........................................................................................
380
Figure 243 Security Certificate 2 (Netscape)
........................................................................................
380
Figure 244 Example: Lock Denoting a Secure Connection
.................................................................
381
Figure 245 Replace Certificate
.............................................................................................................
382
Figure 246 Device-specific Certificate
..................................................................................................
382
Figure 247 Common ZyWALL Certificate
.............................................................................................
382
Figure 248 SSH Example 1: Store Host Key
........................................................................................
383
Figure 249 SSH Example 2: Test
........................................................................................................
383
Figure 250 SSH Example 2: Log in
......................................................................................................
384
Figure 251 Secure FTP: Firmware Upload Example
............................................................................
384
Figure 252 HTTPS Implementation
......................................................................................................
385
Figure 253 ADVANCED > REMOTE MGMT > WWW
..........................................................................
386