ZyXEL Communications P-793H User Manual

Page of 444
List of Figures
P-793H User’s Guide
24
Figure 39 LAN > IP > Advanced Setup .................................................................................................. 98
Figure 40 LAN > DHCP Setup ................................................................................................................ 99
Figure 41 LAN > Client List ................................................................................................................... 100
Figure 42 Physical Network & Partitioned Logical Networks ................................................................ 101
Figure 43 LAN > IP Alias  ...................................................................................................................... 102
Figure 44 How NAT Works  ................................................................................................................... 104
Figure 45 NAT Application With IP Alias  .............................................................................................. 105
Figure 46 NAT > General ...................................................................................................................... 106
Figure 47 Multiple Servers Behind NAT Example  ................................................................................ 108
Figure 48 NAT > Port Forwarding ......................................................................................................... 109
Figure 49 NAT > Port Forwarding > Edit  ...............................................................................................110
Figure 50 NAT > Address Mapping  .......................................................................................................111
Figure 51 NAT > Address Mapping > Edit  .............................................................................................112
Figure 52 ZyXEL Device Firewall Application ........................................................................................119
Figure 53 Three-Way Handshake ......................................................................................................... 120
Figure 54 SYN Flood  ............................................................................................................................ 121
Figure 55 Smurf Attack ......................................................................................................................... 121
Figure 56 Stateful Inspection  ................................................................................................................ 123
Figure 57 Ideal Firewall Setup .............................................................................................................. 132
Figure 58 “Triangle Route” Problem ..................................................................................................... 133
Figure 59 IP Alias  ................................................................................................................................. 133
Figure 60 Firewall > General  ................................................................................................................ 134
Figure 61 Firewall > Rules .................................................................................................................... 135
Figure 62 Firewall > Rules > Add/Edit  .................................................................................................. 137
Figure 63 Firewall > Rules > Add/Edit > Edit Customized Services  ..................................................... 139
Figure 64 Firewall > Rules > Add/Edit > Edit Customized Services > Edit ........................................... 140
Figure 65 Firewall Example: Rules ....................................................................................................... 141
Figure 66 Edit Custom Port Example ................................................................................................... 141
Figure 67 Firewall Example: Edit Rule: Destination Address   .............................................................. 142
Figure 68 Firewall Example: Edit Rule: Select Customized Services ................................................... 143
Figure 69 Firewall Example: Rules: MyService   ................................................................................... 144
Figure 70 Firewall > Anti Probing  ......................................................................................................... 144
Figure 71 Firewall > Threshold  ............................................................................................................. 147
Figure 72 Content Filter > Keyword ...................................................................................................... 149
Figure 73 Content Filter > Schedule ..................................................................................................... 150
Figure 74 Content Filter > Trusted ........................................................................................................ 151
Figure 75 VPN: Example  ...................................................................................................................... 153
Figure 76 VPN: IKE SA and IPSec SA   ................................................................................................ 154
Figure 77 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ........................................... 155
Figure 78 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange  ........................................ 155
Figure 79 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................... 156
Figure 80 VPN/NAT Example  ............................................................................................................... 158
Figure 81 VPN: Transport and Tunnel Mode Encapsulation  ................................................................ 159