![background image](/i/zyxel/144701/zyxel-zywall-2wg-ee/h/zyxel-zywall-2wg-ee-032.png)
List of Figures
ZyWALL 2WG User’s Guide
32
Figure 211 VPN Log Example ............................................................................................................. 330
Figure 212 IKE/IPSec Debug Example ............................................................................................... 331
Figure 213 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ......................................... 332
Figure 214 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ...................................... 332
Figure 215 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 333
Figure 216 VPN/NAT Example ............................................................................................................. 335
Figure 217 IPSec High Availability ....................................................................................................... 337
Figure 218 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 339
Figure 219 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 340
Figure 220 Certificates on Your Computer ........................................................................................... 344
Figure 221 Certificate Details .............................................................................................................. 345
Figure 222 SECURITY > CERTIFICATES > My Certificates ............................................................... 346
Figure 223 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 348
Figure 224 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 350
Figure 225 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 352
Figure 226 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 352
Figure 227 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 353
Figure 228 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 354
Figure 229 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 358
Figure 230 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 360
Figure 231 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 363
Figure 232 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 364
Figure 233 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 365
Figure 234 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 366
Figure 235 SECURITY > CERTIFICATES > Directory Servers ............................................................ 368
Figure 236 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 369
Figure 237 SECURITY > AUTH SERVER > Local User Database ...................................................... 373
Figure 238 SECURITY > AUTH SERVER > RADIUS .......................................................................... 374
Figure 239 ADVANCED > NAT > NAT Overview .................................................................................. 381
Figure 240 ADVANCED > NAT > Address Mapping ............................................................................. 383
Figure 241 ADVANCED > NAT > Address Mapping > Edit .................................................................. 384
Figure 242 Multiple Servers Behind NAT Example .............................................................................. 386
Figure 243 Port Translation Example ................................................................................................... 387
Figure 244 ADVANCED > NAT > Port Forwarding ............................................................................... 388
Figure 245 Trigger Port Forwarding Process: Example ........................................................................ 389
Figure 246 ADVANCED > NAT > Port Triggering ................................................................................. 390
Figure 247 How NAT Works ................................................................................................................. 392
Figure 248 NAT Application With IP Alias ............................................................................................ 393
Figure 249 Port Restricted Cone NAT Example ................................................................................... 394
Figure 250 Example of Static Routing Topology ................................................................................... 395
Figure 251 ADVANCED > STATIC ROUTE > IP Static Route .............................................................. 396
Figure 252 ADVANCED > STATIC ROUTE > IP Static Route > Edit .................................................... 397
Figure 253 ADVANCED > POLICY ROUTE > Policy Route Summary ................................................ 401