ZyWALL 35 User’s Guide
29
Figure 166 System DNS: Add Address Record .................................................................. 343
Figure 167 System DNS: Insert Name Server Record ........................................................ 344
Figure 168 DNS Cache ....................................................................................................... 345
Figure 169 DNS LAN .......................................................................................................... 347
Figure 170 DDNS ................................................................................................................ 349
Figure 171 HTTPS Implementation ..................................................................................... 353
Figure 172 WWW ................................................................................................................ 354
Figure 173 Security Alert Dialog Box (Internet Explorer) .................................................... 355
Figure 174 Security Certificate 1 (Netscape) ...................................................................... 356
Figure 175 Security Certificate 2 (Netscape) ...................................................................... 356
Figure 176 Login Screen (Internet Explorer) ....................................................................... 358
Figure 177 Login Screen (Netscape) .................................................................................. 358
Figure 178 Replace Certificate ............................................................................................ 359
Figure 179 Device-specific Certificate ................................................................................. 359
Figure 180 Common ZyWALL Certificate ............................................................................ 360
Figure 181 SSH Communication Example .......................................................................... 360
Figure 182 How SSH Works ............................................................................................... 361
Figure 183 SSH ................................................................................................................... 362
Figure 184 SSH Example 1: Store Host Key ....................................................................... 363
Figure 185 SSH Example 2: Test ....................................................................................... 364
Figure 186 SSH Example 2: Log in ..................................................................................... 364
Figure 187 Secure FTP: Firmware Upload Example .......................................................... 365
Figure 188 Telnet Configuration on a TCP/IP Network ....................................................... 365
Figure 189 Telnet ................................................................................................................ 366
Figure 190 FTP ................................................................................................................... 367
Figure 191 SNMP Management Model ............................................................................... 368
Figure 192 SNMP ................................................................................................................ 370
Figure 193 DNS .................................................................................................................. 371
Figure 194 CNM .................................................................................................................. 372
Figure 195 Configuring UPnP ............................................................................................. 376
Figure 196 UPnP Ports ....................................................................................................... 377
Figure 197 View Log ........................................................................................................... 386
Figure 198 Log Settings ...................................................................................................... 388
Figure 199 Reports ............................................................................................................. 391
Figure 200 Web Site Hits Report Example ......................................................................... 392
Figure 201 Protocol/Port Report Example .......................................................................... 393
Figure 202 LAN IP Address Report Example ...................................................................... 394
Figure 203 General Setup ................................................................................................... 396
Figure 204 Password Setup ................................................................................................ 397
Figure 205 Time and Date ................................................................................................... 398
Figure 206 Synchronization in Process ............................................................................... 401
Figure 207 Synchronization is Successful .......................................................................... 401
Figure 208 Synchronization Fail .......................................................................................... 401
Summary of Contents for ZyXEL ZyWALL 35
Page 1: ...ZyWALL 35 Internet Security Appliance User s Guide Version 3 64 3 2005 ...
Page 2: ......
Page 38: ...ZyWALL 35 User s Guide 36 ...
Page 46: ...ZyWALL 35 User s Guide 44 ...
Page 74: ...ZyWALL 35 User s Guide 72 Chapter 2 Introducing the Web Configurator ...
Page 90: ...ZyWALL 35 User s Guide 88 Chapter 3 Wizard Setup ...
Page 100: ...ZyWALL 35 User s Guide 98 Chapter 4 LAN Screens ...
Page 106: ...ZyWALL 35 User s Guide 104 Chapter 5 Bridge Screens ...
Page 128: ...ZyWALL 35 User s Guide 126 Chapter 6 Wireless LAN ...
Page 135: ...ZyWALL 35 User s Guide Chapter 7 WAN Screens 133 Figure 47 General ...
Page 152: ...ZyWALL 35 User s Guide 150 Chapter 7 WAN Screens Figure 57 Dial Backup Setup ...
Page 158: ...ZyWALL 35 User s Guide 156 Chapter 7 WAN Screens ...
Page 166: ...ZyWALL 35 User s Guide 164 Chapter 8 DMZ Screens ...
Page 234: ...ZyWALL 35 User s Guide 232 Chapter 13 Introduction to IPSec ...
Page 275: ...ZyWALL 35 User s Guide Chapter 15 Certificates 273 Figure 129 My Certificate Details ...
Page 294: ...ZyWALL 35 User s Guide 292 Chapter 16 Authentication Server Figure 140 Local User Database ...
Page 314: ...ZyWALL 35 User s Guide 312 Chapter 17 Network Address Translation NAT ...
Page 318: ...ZyWALL 35 User s Guide 316 Chapter 18 Static Route ...
Page 324: ...ZyWALL 35 User s Guide 322 Chapter 19 Policy Route ...
Page 340: ...ZyWALL 35 User s Guide 338 Chapter 20 Bandwidth Management ...
Page 376: ...ZyWALL 35 User s Guide 374 Chapter 22 Remote Management ...
Page 390: ...ZyWALL 35 User s Guide 388 Chapter 24 Logs Screens Figure 198 Log Settings ...
Page 413: ...ZyWALL 35 User s Guide Chapter 25 Maintenance 411 Figure 220 Restart Screen ...
Page 414: ...ZyWALL 35 User s Guide 412 Chapter 25 Maintenance ...
Page 440: ...ZyWALL 35 User s Guide 438 Chapter 28 WAN and Dial Backup Setup ...
Page 456: ...ZyWALL 35 User s Guide 454 Chapter 31 DMZ Setup ...
Page 460: ...ZyWALL 35 User s Guide 458 Chapter 32 Route Setup ...
Page 470: ...ZyWALL 35 User s Guide 468 Chapter 33 Remote Node Setup ...
Page 522: ...ZyWALL 35 User s Guide 520 Chapter 39 System Information Diagnosis ...
Page 538: ...ZyWALL 35 User s Guide 536 Chapter 40 Firmware and Configuration File Maintenance ...
Page 550: ...ZyWALL 35 User s Guide 548 Chapter 42 Remote Management ...
Page 558: ...ZyWALL 35 User s Guide 556 Chapter 43 IP Policy Routing ...
Page 574: ...ZyWALL 35 User s Guide 572 Chapter 45 Troubleshooting Figure 364 Java Sun ...
Page 602: ...ZyWALL 35 User s Guide 600 Appendix C IP Subnetting ...
Page 608: ...ZyWALL 35 User s Guide 606 Appendix E PPTP ...
Page 626: ...ZyWALL 35 User s Guide 624 Appendix G Triangle Route ...
Page 656: ...ZyWALL 35 User s Guide 654 Appendix J Importing Certificates ...
Page 658: ...ZyWALL 35 User s Guide 656 Appendix K Command Interpreter ...
Page 664: ...ZyWALL 35 User s Guide 662 Appendix L Firewall Commands ...
Page 668: ...ZyWALL 35 User s Guide 666 Appendix M NetBIOS Filter Commands ...
Page 674: ...ZyWALL 35 User s Guide 672 Appendix O Brute Force Password Guessing Protection ...
Page 696: ...ZyWALL 35 User s Guide 694 Appendix Q Log Descriptions ...