ZyWALL User's Guide

List of Figures
ZyWALL USG 100/200 Series User’s Guide
35
Figure 254 VPN > IPSec VPN > VPN Gateway ................................................................................... 363
Figure 255 VPN > IPSec VPN > VPN Gateway > Edit ......................................................................... 365
Figure 256 VPN Topologies (Fully Meshed and Hub and Spoke) ........................................................ 369
Figure 257 VPN > IPSec VPN > Concentrator ..................................................................................... 370
Figure 258 VPN > IPSec VPN > Concentrator > Edit ........................................................................... 370
Figure 259 Network > IPSec VPN > Concentrator > Edit > Member .................................................... 371
Figure 260 VPN > IPSec VPN > SA Monitor ........................................................................................372
Figure 261 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ....................................... 373
Figure 262 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange .................................... 374
Figure 263 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ........................................... 375
Figure 264 VPN/NAT Example ............................................................................................................. 377
Figure 265 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 380
Figure 266 VPN Example: NAT for Inbound and Outbound Traffic ...................................................... 382
Figure 267 Network Access Mode: Reverse Proxy ............................................................................. 385
Figure 268 Network Access Mode: Full Tunnel Mode ......................................................................... 386
Figure 269 VPN > SSL VPN > Access Privilege ................................................................................. 387
Figure 270 VPN > SSL VPN > Access Privilege > Add/Edit ................................................................ 388
Figure 271 VPN > SSL VPN > Connection Monitor ............................................................................ 390
Figure 272 VPN > SSL VPN > Global Setting .....................................................................................391
Figure 273 Example Logo Graphic Display ......................................................................................... 392
Figure 274 SSL VPN Client Portal Screen Example ........................................................................... 393
Figure 275 Network Example .............................................................................................................. 395
Figure 276 Enter the Address in a Web Browser ............................................................................... 396
Figure 277 Login Security Screen ..................................................................................................... 397
Figure 278 Login Screen .................................................................................................................... 397
Figure 279 Java Needed Message ..................................................................................................... 397
Figure 280 SecuExtender Progress .................................................................................................. 398
Figure 281 Remote User Screen .......................................................................................................... 398
Figure 282 Add Favorite ...................................................................................................................... 399
Figure 283 Logout: Prompt .................................................................................................................. 399
Figure 284 Logout: Connection Termination Progress ........................................................................ 400
Figure 285 Application ......................................................................................................................... 401
Figure 286 File Sharing ....................................................................................................................... 404
Figure 287 File Sharing: Enter Access User Name and Password .................................................... 404
Figure 288 File Sharing: Open a Word File ........................................................................................ 405
Figure 289 File Sharing: Save a Word File ......................................................................................... 406
Figure 290 File Sharing: Save a Word File ......................................................................................... 406
Figure 291 File Sharing: Rename ........................................................................................................ 407
Figure 292 File Sharing: Rename ........................................................................................................ 407
Figure 293 File Sharing: Delete Prompt .............................................................................................. 407
Figure 294 File Sharing: File Upload ................................................................................................... 408
Figure 295 L2TP VPN Overview .......................................................................................................... 409
Figure 296 Policy Route for L2TP VPN ............................................................................................... 410