ZyXEL Communications ZYWALL 35 User Manual page 18

Internet security appliance
Hide thumbs Also See for ZYWALL 35:
Table of Contents

Advertisement

Table of Contents
16.1 Content Filtering Overview .............................................................................................. 321
16.1.1 Restrict Web Features ........................................................................................... 321
16.1.2 Create a Filter List .................................................................................................. 321
16.1.3 Customize Web Site Access ................................................................................. 321
16.2 Content Filtering with an External Database ................................................................... 321
16.3 Content Filter General Screen ........................................................................................ 322
16.5 Content Filter Policy: General ......................................................................................... 327
16.6 Content Filter Policy: External Database ........................................................................ 329
16.7 Content Filter Policy: Customization ............................................................................... 336
16.8 Content Filter Policy: Schedule ...................................................................................... 337
16.9 Content Filter Object ....................................................................................................... 338
16.10 Content Filtering Cache ................................................................................................ 340
Chapter 17
Content Filtering Reports..................................................................................................... 343
17.1 Checking Content Filtering Activation .............................................................................. 343
17.2 Viewing Content Filtering Reports ................................................................................... 343
17.3 Web Site Submission ....................................................................................................... 348
Chapter 18
IPSec VPN.............................................................................................................................. 351
18.1 IPSec VPN Overview ..................................................................................................... 351
18.1.1 IKE SA Overview .................................................................................................... 352
18.2 VPN Rules (IKE) .............................................................................................................. 353
18.3 IKE SA Setup .................................................................................................................. 355
18.3.1 IKE SA Proposal .................................................................................................... 355
18.4 Additional IPSec VPN Topics ........................................................................................... 360
18.4.1 SA Life Time ........................................................................................................... 360
18.4.2 IPSec High Availability ........................................................................................... 361
18.4.3 Encryption and Authentication Algorithms ............................................................. 361
18.5 VPN Rules (IKE) Gateway Policy Edit ............................................................................. 362
18.6.1 Local and Remote Networks .................................................................................. 368
18.6.2 Virtual Address Mapping ........................................................................................ 369
18.6.3 Active Protocol ....................................................................................................... 370
18.6.4 Encapsulation ......................................................................................................... 370
18.6.5 IPSec SA Proposal and Perfect Forward Secrecy ................................................. 371
18.7 Network Policy Edit ......................................................................................................... 372
18.8 Network Policy Edit: Port Forwarding ............................................................................. 377
18.9 Network Policy Move ..................................................................................................... 379
18.10.1 IPSec SA Proposal Using Manual Keys ............................................................... 380
18
..................................................................................................... 325
..................................................................................................... 368
................................................................................... 380
ZyWALL 5/35/70 Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents