Zyxel-communications 5 Series Instrukcja Użytkownika Strona 35

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 34
ZyWALL 5/35/70 Series User’s Guide
List of Figures 35
Figure 168 VPN: Example ................................................................................................... 323
Figure 169 VPN: IKE SA and IPSec SA ............................................................................. 324
Figure 170 Gateway and Network Policies ........................................................................ 325
Figure 171 IPSec Fields Summary ................................................................................... 325
Figure 172 SECURITY > VPN > VPN Rules (IKE) ............................................................ 326
Figure 173 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ....................... 327
Figure 174 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ..................... 328
Figure 175 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ........................... 328
Figure 176 VPN/NAT Example ............................................................................................ 331
Figure 177 IPSec High Availability ...................................................................................... 333
Figure 178 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ....................... 335
Figure 179 VPN: Transport and Tunnel Mode Encapsulation ............................................. 341
Figure 180 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ......................... 343
Figure 181 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ....................... 347
Figure 182 SECURITY > VPN > VPN Rules (Manual) ...................................................... 349
Figure 183 SECURITY > VPN > VPN Rules (Manual) > Edit ............................................ 350
Figure 184 SECURITY > VPN > SA Monitor .................................................................... 353
Figure 185 SECURITY > VPN > Global Setting ................................................................ 354
Figure 186 Telecommuters Sharing One VPN Rule Example ............................................. 356
Figure 187 Telecommuters Using Unique VPN Rules Example ......................................... 357
Figure 188 VPN for Remote Management Example ........................................................... 358
Figure 189 VPN Topologies ................................................................................................ 359
Figure 190 Hub-and-spoke VPN Example .......................................................................... 360
Figure 191 Certificates on Your Computer .......................................................................... 364
Figure 192 Certificate Details ............................................................................................. 365
Figure 193 Certificate Configuration Overview ................................................................... 365
Figure 194 SECURITY > CERTIFICATES > My Certificates ............................................. 366
Figure 195 SECURITY > CERTIFICATES > My Certificates > Details ............................... 368
Figure 196 SECURITY > CERTIFICATES > My Certificates > Export ................................ 371
Figure 197 SECURITY > CERTIFICATES > My Certificates > Import ................................ 373
Figure 198 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 .............. 373
Figure 199 SECURITY > CERTIFICATES > My Certificates > Create ............................... 374
Figure 200 SECURITY > CERTIFICATES > Trusted CAs .................................................. 377
Figure 201 SECURITY > CERTIFICATES > Trusted CAs > Details ................................... 379
Figure 202 SECURITY > CERTIFICATES > Trusted CAs > Import .................................... 382
Figure 203 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................. 383
Figure 204 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import .................... 384
Figure 205 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ................... 386
Figure 206 SECURITY > CERTIFICATES > Directory Servers .......................................... 388
Figure 207 SECURITY > CERTIFICATES > Directory Server > Add ................................. 389
Figure 208 SECURITY > AUTH SERVER > Local User Database ..................................... 392
Figure 209 SECURITY > AUTH SERVER > RADIUS ........................................................ 393
Figure 210 How NAT Works ................................................................................................ 396
Przeglądanie stron 34
1 2 ... 30 31 32 33 34 35 36 37 38 39 40 ... 834 835

Komentarze do niniejszej Instrukcji

Brak uwag