5.10
5.10.1
Feld Active ........................................................................................................................ 5-17
5.10.2
Feld IPSec Keying Mode .................................................................................................. 5-17
5.10.3
Feld Negotiation Mode...................................................................................................... 5-18
5.10.4
Feld Local Address............................................................................................................ 5-18
5.10.5
Feld Remote Address Start................................................................................................ 5-19
5.10.6
Feld Remote Address End ................................................................................................. 5-19
5.10.7
Feld My IP Address........................................................................................................... 5-19
5.10.8
5.10.9
Feld Encapsulation Mode.................................................................................................. 5-20
5.10.10 Feld IPSec Protocol........................................................................................................... 5-21
5.10.11 Feld Pre-Shared Key ......................................................................................................... 5-22
5.11
5.12
5.12.1
SA Life Time..................................................................................................................... 5-25
5.13
5.14
5.14.1
Beispielprotokolle ............................................................................................................. 5-27
5.14.2
6.1
Einführung .................................................................................................................................. 6-1
6.2
Fenster System Status.................................................................................................................. 6-1
6.2.1
Systemstatus ........................................................................................................................ 6-1
6.3
Fenster DHCP Table ................................................................................................................... 6-1
6.4
6.5
Fenster Configuration.................................................................................................................. 6-2
6.5.1
Backup................................................................................................................................. 6-2
6.5.2
Restore................................................................................................................................. 6-2
6.5.3
Default................................................................................................................................. 6-2
7.1
Dateinamenskonventionen .......................................................................................................... 7-1
7.2
Konfigurationsdatei sichern ........................................................................................................ 7-2
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
Beispiel zu TFTP-Befehlen ................................................................................................. 7-4
7.2.6
Inhaltsverzeichnis
ZyWALL 1 Internet Security-Gateway
vii