ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual page 31

Internet security appliance
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Figure 125 Anti-Spam: General ........................................................................................... 266
Figure 126 Anti-Spam: External DB .................................................................................... 268
Figure 127 Anti-Spam: Lists ................................................................................................ 270
Figure 128 Anti-Spam Rule Edit ......................................................................................... 271
Figure 129 Content Filter : General ..................................................................................... 275
Figure 130 Content Filtering Lookup Procedure ................................................................. 277
Figure 131 Content Filter : Categories ................................................................................ 278
Figure 132 Content Filter: Customization ............................................................................ 284
Figure 133 Content Filter: Cache ........................................................................................ 287
Figure 134 myZyXEL.com: Login ........................................................................................ 291
Figure 135 myZyXEL.com: Welcome .................................................................................. 291
Figure 136 myZyXEL.com: Service Management ............................................................... 292
Figure 137 Blue Coat: Login ............................................................................................... 292
Figure 138 Content Filtering Reports Main Screen ............................................................. 293
Figure 139 Blue Coat: Report Home ................................................................................... 293
Figure 140 Global Report Screen Example ........................................................................ 294
Figure 141 Requested URLs Example ................................................................................ 295
Figure 142 Web Page Review Process Screen .................................................................. 296
Figure 143 Encryption and Decryption ................................................................................ 299
Figure 144 IPSec Architecture ............................................................................................ 300
Figure 145 Transport and Tunnel Mode IPSec Encapsulation ............................................ 301
Figure 146 NAT Router Between IPSec Routers ................................................................ 307
Figure 147 Two Phases to Set Up the IPSec SA ................................................................ 309
Figure 148 VPN Rules (IKE) ............................................................................................... 312
Figure 149 Gateway and Network Policies ........................................................................ 313
Figure 151 VPN Rules (IKE): Gateway Policy: Edit .......................................................... 315
Figure 152 VPN Rules (IKE): Network Policy Edit ............................................................. 321
Figure 153 VPN Rules (IKE): Network Policy Move ........................................................... 325
Figure 154 VPN Rules (Manual) ........................................................................................ 326
Figure 155 VPN Rules (Manual): Edit ................................................................................ 328
Figure 156 VPN: SA Monitor ............................................................................................... 331
Figure 157 VPN: Global Setting .......................................................................................... 332
Figure 158 Telecommuters Sharing One VPN Rule Example ............................................. 334
Figure 159 Telecommuters Using Unique VPN Rules Example ......................................... 335
Figure 160 Certificate Configuration Overview ................................................................... 339
Figure 161 My Certificates ................................................................................................. 340
Figure 162 My Certificate Import ......................................................................................... 343
Figure 163 My Certificate Create ........................................................................................ 344
Figure 164 My Certificate Details ........................................................................................ 347
Figure 165 Trusted CAs ...................................................................................................... 350
Figure 166 Trusted CA Import ............................................................................................. 351
Figure 167 Trusted CA Details ............................................................................................ 353
31
................................................................................... 313
List of Figures

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents