ZyWALL Series Internet Security Gateway
Table 12-2 Firewall Summary ......................................................................................................................12-8
Table 12-3 Firewall Edit Rule.....................................................................................................................12-11
Table 12-6 BM Global Setting....................................................................................................................12-16
Table 12-7 Predefined Services ..................................................................................................................12-22
Table 12-8 Attack Alert...............................................................................................................................12-26
Table 14-1 VPN and NAT.............................................................................................................................14-5
Table 15-1 AH and ESP ................................................................................................................................15-2
Table 15-2 VPN Rules ..................................................................................................................................15-4
Table 15-7 VPN IKE...................................................................................................................................15-12
Table 15-8 VPN IKE: Advanced.................................................................................................................15-22
Table 15-9 VPN Manual Key .....................................................................................................................15-25
Table 15-10 SA Monitor .............................................................................................................................15-29
Table 15-11 Global Setting .........................................................................................................................15-30
Table 16-1 My Certificates ...........................................................................................................................16-4
Table 16-5 Trusted CAs ..............................................................................................................................16-17
Table 16-6 Trusted CA Details....................................................................................................................16-21
Table 16-10 Directory Servers ....................................................................................................................16-33
Table 17-1 Local User Database ...................................................................................................................17-3
Table 17-2 RADIUS .....................................................................................................................................17-6
Table 18-1 WWW.........................................................................................................................................18-4
Table 18-2 SSH...........................................................................................................................................18-17
xxiv
List of Tables