ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual page 42

Internet security appliance
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide
Table 82 Common Computer Virus Types ......................................................................... 254
Table 83 Anti-Virus: General .............................................................................................. 258
Table 84 Anti-Virus: Update ............................................................................................... 260
Table 85 Anti-Spam: General ............................................................................................. 267
Table 86 Anti-Spam: External DB ....................................................................................... 268
Table 87 Anti-Spam: Lists ................................................................................................... 270
Table 88 Anti-Spam Rule Edit ............................................................................................ 272
Table 89 Content Filter : General ....................................................................................... 275
Table 90 Content Filter: Categories .................................................................................... 278
Table 91 Content Filter: Customization .............................................................................. 285
Table 92 Content Filter: Cache ........................................................................................... 288
Table 93 VPN and NAT ...................................................................................................... 302
Table 94 ESP and AH ........................................................................................................ 305
Table 95 Local ID Type and Content Fields ....................................................................... 308
Table 96 Peer ID Type and Content Fields ........................................................................ 308
Table 97 Matching ID Type and Content Configuration Example ....................................... 308
Table 99 IPSec Fields Summary ........................................................................................ 312
Table 100 VPN screen Icons Key ....................................................................................... 313
Table 101 VPN Rules (IKE): Gateway Policy: Edit ............................................................. 316
Table 102 VPN Rules (IKE): Network Policy Edit ............................................................... 322
Table 103 VPN Rules (IKE): Network Policy Move ............................................................ 325
Table 104 VPN Rules (Manual) .......................................................................................... 326
Table 105 VPN Rules (Manual) Edit ................................................................................... 328
Table 106 VPN: SA Monitor ............................................................................................... 331
Table 107 VPN: Global Setting ........................................................................................... 332
Table 108 Telecommuters Sharing One VPN Rule Example ............................................. 334
Table 109 Telecommuters Using Unique VPN Rules Example .......................................... 335
Table 110 My Certificates ................................................................................................... 340
Table 111 My Certificate Import .......................................................................................... 343
Table 112 My Certificate Create ......................................................................................... 344
Table 113 My Certificate Details ......................................................................................... 348
Table 114 Trusted CAs ....................................................................................................... 350
Table 115 Trusted CA Import .............................................................................................. 352
Table 116 Trusted CA Details ............................................................................................. 353
Table 117 Trusted Remote Hosts ....................................................................................... 356
Table 118 Trusted Remote Host Import .............................................................................. 359
Table 119 Trusted Remote Host Details ............................................................................. 360
Table 120 Directory Servers ............................................................................................... 363
Table 121 Directory Server Add ......................................................................................... 364
Table 122 Local User Database ......................................................................................... 368
Table 123 RADIUS ............................................................................................................. 369
Table 124 NAT Definitions .................................................................................................. 370
List of Tables
42

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 5 seriesZywall 35 seriesZywall 70 series

Table of Contents