ZyXEL Communications P-661H Series User Manual

Page of 358
 List of Figures
P-661H/HW Series User’s Guide
23
Figure 82 Stateful Inspection  ................................................................................................................ 143
Figure 83 Ideal Firewall Setup .............................................................................................................. 152
Figure 84 “Triangle Route” Problem ..................................................................................................... 153
Figure 85 IP Alias  ................................................................................................................................. 153
Figure 86 Firewall: General  .................................................................................................................. 154
Figure 87 Firewall Rules  ...................................................................................................................... 156
Figure 88 Firewall: Edit Rule  ................................................................................................................ 158
Figure 89 Firewall: Customized Services ............................................................................................. 160
Figure 90 Firewall: Configure Customized Services ............................................................................. 161
Figure 91 Firewall Example: Rules ....................................................................................................... 162
Figure 92 Edit Custom Port Example ................................................................................................... 162
Figure 93 Firewall Example: Edit Rule: Destination Address   .............................................................. 163
Figure 94 Firewall Example: Edit Rule: Select Customized Services ................................................... 164
Figure 95 Firewall Example: Rules: MyService   ................................................................................... 165
Figure 96 Firewall: Anti Probing ........................................................................................................... 165
Figure 97 Firewall: Thresholds  ............................................................................................................. 168
Figure 98 Content Filter: Keyword ........................................................................................................ 172
Figure 99 Content Filter: Schedule ....................................................................................................... 173
Figure 100 Content Filter: Trusted ........................................................................................................ 174
Figure 101 Encryption and Decryption ................................................................................................. 176
Figure 102 IPSec Architecture .............................................................................................................. 177
Figure 103 Transport and Tunnel Mode IPSec Encapsulation  ............................................................. 178
Figure 104 IPSec Summary Fields ....................................................................................................... 183
Figure 105 VPN Setup .......................................................................................................................... 184
Figure 106 NAT Router Between IPSec Routers  ................................................................................. 185
Figure 107 VPN Host using Intranet DNS Server Example .................................................................. 186
Figure 108 Edit VPN Policies   .............................................................................................................. 189
Figure 109 Two Phases to Set Up the IPSec SA  ................................................................................. 193
Figure 110 Advanced VPN Policies ...................................................................................................... 195
Figure 111 VPN: Manual Key ................................................................................................................ 198
Figure 112 VPN: SA Monitor  ................................................................................................................ 201
Figure 113 VPN: Global Setting ............................................................................................................ 201
Figure 114 Telecommuters Sharing One VPN Rule Example .............................................................. 202
Figure 115 Telecommuters Using Unique VPN Rules Example  ........................................................... 203
Figure 116 Example of Static Routing Topology  ................................................................................... 207
Figure 117 Static Route  ........................................................................................................................ 208
Figure 118 Static Route Edit  ................................................................................................................. 209
Figure 119 Subnet-based Bandwidth Management Example ............................................................... 212
Figure 120 Bandwidth Management: Summary ................................................................................... 216
Figure 121 Bandwidth Management: Rule Setup ................................................................................. 217
Figure 122 Bandwidth Management Rule Configuration ...................................................................... 218
Figure 123 Bandwidth Management: Monitor  ...................................................................................... 220
Figure 124 Dynamic DNS ..................................................................................................................... 222