ZyXEL Communications ZyWall 10W User Manual page 24

Zywall series internet security gateway
Hide thumbs Also See for ZyWall 10W:
Table of Contents

Advertisement

ZyWALL Series Internet Security Gateway
Table 11-3 Legal NetBIOS Commands ........................................................................................................11-7
Table 11-4 Legal SMTP Commands.............................................................................................................11-7
Table 12-1 Application and Subnet-based Bandwidth Management Example .............................................12-6
Table 12-2 Firewall Summary ......................................................................................................................12-8
Table 12-3 Firewall Edit Rule.....................................................................................................................12-11
Table 12-4 Source and Destination Addresses Add/Edit.............................................................................12-14
Table 12-5 Custom Port Create/Edit ...........................................................................................................12-15
Table 12-6 BM Global Setting....................................................................................................................12-16
Table 12-7 Predefined Services ..................................................................................................................12-22
Table 12-8 Attack Alert...............................................................................................................................12-26
Table 13-1 Content Filtering General ...........................................................................................................13-2
Table 13-2 Content Filtering Categories.......................................................................................................13-7
Table 13-3 Content Filtering Customization...............................................................................................13-14
Table 14-1 VPN and NAT.............................................................................................................................14-5
Table 15-1 AH and ESP ................................................................................................................................15-2
Table 15-2 VPN Rules ..................................................................................................................................15-4
Table 15-3 Local ID Type and Content Fields ..............................................................................................15-9
Table 15-4 Peer ID Type and Content Fields ................................................................................................15-9
Table 15-5 Matching ID Type and Content Configuration Example ............................................................15-9
Table 15-6 Mismatching ID Type and Content Configuration Example.....................................................15-10
Table 15-7 VPN IKE...................................................................................................................................15-12
Table 15-8 VPN IKE: Advanced.................................................................................................................15-22
Table 15-9 VPN Manual Key .....................................................................................................................15-25
Table 15-10 SA Monitor .............................................................................................................................15-29
Table 15-11 Global Setting .........................................................................................................................15-30
Table 15-12 Telecommuters Sharing One VPN Rule Example ..................................................................15-31
Table 15-13 Telecommuters Using Unique VPN Rules Example...............................................................15-33
Table 16-1 My Certificates ...........................................................................................................................16-4
Table 16-2 My Certificate Import .................................................................................................................16-8
Table 16-3 My Certificate Create .................................................................................................................16-9
Table 16-4 My Certificate Details...............................................................................................................16-14
Table 16-5 Trusted CAs ..............................................................................................................................16-17
Table 16-6 Trusted CA Details....................................................................................................................16-21
Table 16-7 Trusted Remote Hosts...............................................................................................................16-24
Table 16-8Trusted Remote Host Import .....................................................................................................16-27
Table 16-9 Trusted Remote Host Details ....................................................................................................16-30
Table 16-10 Directory Servers ....................................................................................................................16-33
Table 16-11 Directory Server Add ..............................................................................................................16-34
Table 17-1 Local User Database ...................................................................................................................17-3
Table 17-2 RADIUS .....................................................................................................................................17-6
Table 18-1 WWW.........................................................................................................................................18-4
Table 18-2 SSH...........................................................................................................................................18-17
xxiv
List of Tables

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 30wZywall 100Zywall 50

Table of Contents