ZyXEL Communications P-661H Series User Manual
List of Figures
P-661H/HW Series User’s Guide
23
Figure 82 Stateful Inspection ................................................................................................................ 143
Figure 83 Ideal Firewall Setup .............................................................................................................. 152
Figure 84 “Triangle Route” Problem ..................................................................................................... 153
Figure 85 IP Alias ................................................................................................................................. 153
Figure 86 Firewall: General .................................................................................................................. 154
Figure 87 Firewall Rules ...................................................................................................................... 156
Figure 88 Firewall: Edit Rule ................................................................................................................ 158
Figure 89 Firewall: Customized Services ............................................................................................. 160
Figure 90 Firewall: Configure Customized Services ............................................................................. 161
Figure 91 Firewall Example: Rules ....................................................................................................... 162
Figure 92 Edit Custom Port Example ................................................................................................... 162
Figure 93 Firewall Example: Edit Rule: Destination Address .............................................................. 163
Figure 94 Firewall Example: Edit Rule: Select Customized Services ................................................... 164
Figure 95 Firewall Example: Rules: MyService ................................................................................... 165
Figure 96 Firewall: Anti Probing ........................................................................................................... 165
Figure 97 Firewall: Thresholds ............................................................................................................. 168
Figure 98 Content Filter: Keyword ........................................................................................................ 172
Figure 99 Content Filter: Schedule ....................................................................................................... 173
Figure 100 Content Filter: Trusted ........................................................................................................ 174
Figure 101 Encryption and Decryption ................................................................................................. 176
Figure 102 IPSec Architecture .............................................................................................................. 177
Figure 103 Transport and Tunnel Mode IPSec Encapsulation ............................................................. 178
Figure 104 IPSec Summary Fields ....................................................................................................... 183
Figure 105 VPN Setup .......................................................................................................................... 184
Figure 106 NAT Router Between IPSec Routers ................................................................................. 185
Figure 107 VPN Host using Intranet DNS Server Example .................................................................. 186
Figure 108 Edit VPN Policies .............................................................................................................. 189
Figure 109 Two Phases to Set Up the IPSec SA ................................................................................. 193
Figure 110 Advanced VPN Policies ...................................................................................................... 195
Figure 111 VPN: Manual Key ................................................................................................................ 198
Figure 112 VPN: SA Monitor ................................................................................................................ 201
Figure 113 VPN: Global Setting ............................................................................................................ 201
Figure 114 Telecommuters Sharing One VPN Rule Example .............................................................. 202
Figure 115 Telecommuters Using Unique VPN Rules Example ........................................................... 203
Figure 116 Example of Static Routing Topology ................................................................................... 207
Figure 117 Static Route ........................................................................................................................ 208
Figure 118 Static Route Edit ................................................................................................................. 209
Figure 119 Subnet-based Bandwidth Management Example ............................................................... 212
Figure 120 Bandwidth Management: Summary ................................................................................... 216
Figure 121 Bandwidth Management: Rule Setup ................................................................................. 217
Figure 122 Bandwidth Management Rule Configuration ...................................................................... 218
Figure 123 Bandwidth Management: Monitor ...................................................................................... 220
Figure 124 Dynamic DNS ..................................................................................................................... 222
Figure 83 Ideal Firewall Setup .............................................................................................................. 152
Figure 84 “Triangle Route” Problem ..................................................................................................... 153
Figure 85 IP Alias ................................................................................................................................. 153
Figure 86 Firewall: General .................................................................................................................. 154
Figure 87 Firewall Rules ...................................................................................................................... 156
Figure 88 Firewall: Edit Rule ................................................................................................................ 158
Figure 89 Firewall: Customized Services ............................................................................................. 160
Figure 90 Firewall: Configure Customized Services ............................................................................. 161
Figure 91 Firewall Example: Rules ....................................................................................................... 162
Figure 92 Edit Custom Port Example ................................................................................................... 162
Figure 93 Firewall Example: Edit Rule: Destination Address .............................................................. 163
Figure 94 Firewall Example: Edit Rule: Select Customized Services ................................................... 164
Figure 95 Firewall Example: Rules: MyService ................................................................................... 165
Figure 96 Firewall: Anti Probing ........................................................................................................... 165
Figure 97 Firewall: Thresholds ............................................................................................................. 168
Figure 98 Content Filter: Keyword ........................................................................................................ 172
Figure 99 Content Filter: Schedule ....................................................................................................... 173
Figure 100 Content Filter: Trusted ........................................................................................................ 174
Figure 101 Encryption and Decryption ................................................................................................. 176
Figure 102 IPSec Architecture .............................................................................................................. 177
Figure 103 Transport and Tunnel Mode IPSec Encapsulation ............................................................. 178
Figure 104 IPSec Summary Fields ....................................................................................................... 183
Figure 105 VPN Setup .......................................................................................................................... 184
Figure 106 NAT Router Between IPSec Routers ................................................................................. 185
Figure 107 VPN Host using Intranet DNS Server Example .................................................................. 186
Figure 108 Edit VPN Policies .............................................................................................................. 189
Figure 109 Two Phases to Set Up the IPSec SA ................................................................................. 193
Figure 110 Advanced VPN Policies ...................................................................................................... 195
Figure 111 VPN: Manual Key ................................................................................................................ 198
Figure 112 VPN: SA Monitor ................................................................................................................ 201
Figure 113 VPN: Global Setting ............................................................................................................ 201
Figure 114 Telecommuters Sharing One VPN Rule Example .............................................................. 202
Figure 115 Telecommuters Using Unique VPN Rules Example ........................................................... 203
Figure 116 Example of Static Routing Topology ................................................................................... 207
Figure 117 Static Route ........................................................................................................................ 208
Figure 118 Static Route Edit ................................................................................................................. 209
Figure 119 Subnet-based Bandwidth Management Example ............................................................... 212
Figure 120 Bandwidth Management: Summary ................................................................................... 216
Figure 121 Bandwidth Management: Rule Setup ................................................................................. 217
Figure 122 Bandwidth Management Rule Configuration ...................................................................... 218
Figure 123 Bandwidth Management: Monitor ...................................................................................... 220
Figure 124 Dynamic DNS ..................................................................................................................... 222