ZyXEL Communications ZyWall 5 Series User Manual page 47

Internet security appliance
Hide thumbs Also See for ZyWall 5 Series:
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Table 82 SECURITY > ANTI-VIRUS > General ................................................................. 275
Table 83 SECURITY > ANTI-VIRUS > Signature: Query View .......................................... 277
Table 84 SECURITY > ANTI-SPAM > General .................................................................. 290
Table 85 SECURITY > ANTI-SPAM > External DB ............................................................ 293
Table 86 SECURITY > ANTI-SPAM > Lists ........................................................................ 295
Table 87 SECURITY > ANTI-SPAM > Lists > Edit ............................................................. 297
Table 88 SECURITY > CONTENT FILTER > General ....................................................... 300
Table 89 SECURITY > CONTENT FILTER > Categories .................................................. 304
Table 90 SECURITY > CONTENT FILTER > Customization ............................................. 311
Table 91 SECURITY > CONTENT FILTER > Cache ......................................................... 314
Table 92 SECURITY > VPN > VPN Rules (IKE) ................................................................ 326
Table 93 VPN Example: Matching ID Type and Content .................................................... 329
Table 94 VPN Example: Mismatching ID Type and Content .............................................. 329
Table 98 SECURITY > VPN > VPN Rules (Manual) .......................................................... 349
Table 99 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................ 351
Table 100 SECURITY > VPN > SA Monitor ....................................................................... 354
Table 101 SECURITY > VPN > Global Setting .................................................................. 355
Table 102 Telecommuters Sharing One VPN Rule Example ............................................. 357
Table 103 Telecommuters Using Unique VPN Rules Example .......................................... 358
Table 104 SECURITY > CERTIFICATES > My Certificates ............................................... 366
Table 110 SECURITY > CERTIFICATES > Trusted CAs ................................................... 377
Table 111 SECURITY > CERTIFICATES > Trusted CAs > Details .................................... 379
Table 112 SECURITY > CERTIFICATES > Trusted CAs Import ........................................ 382
Table 113 SECURITY > CERTIFICATES > Trusted Remote Hosts ................................... 383
Table 116 SECURITY > CERTIFICATES > Directory Servers ........................................... 389
Table 117 SECURITY > CERTIFICATES > Directory Server > Add .................................. 390
Table 118 SECURITY > AUTH SERVER > Local User Database ..................................... 393
Table 119 SECURITY > AUTH SERVER > RADIUS ......................................................... 394
Table 120 NAT Definitions .................................................................................................. 395
Table 121 NAT Mapping Types .......................................................................................... 399
Table 122 ADVANCED > NAT > NAT Overview ................................................................. 400
Table 123 ADVANCED > NAT > Address Mapping ............................................................ 402
Table 124 ADVANCED > NAT > Address Mapping > Edit ................................................. 404
List of Tables
47

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 70 seriesZywall 35 series

Table of Contents