ZyXEL Communications ZYWALL 35 User Manual page 35

Internet security appliance
Hide thumbs Also See for ZYWALL 35:
Table of Contents

Advertisement

List of Figures
Figure 168 SECURITY > IDP > Update ............................................................................................... 291
Figure 169 SECURITY > IDP > Backup & Restore .............................................................................. 293
............................................................................................ 297
Figure 171 SECURITY > ANTI-VIRUS > General ............................................................................... 299
Figure 172 SECURITY > ANTI-VIRUS > Signature: Query View ......................................................... 301
Figure 173 Query Example Search Criteria .......................................................................................... 302
Figure 174 Query Example Search Results ......................................................................................... 303
Figure 175 SECURITY > ANTI-VIRUS > Update ................................................................................. 304
Figure 176 SECURITY > ANTI-VIRUS > Backup and Restore ............................................................ 306
Figure 177 Anti-spam External Database Example .............................................................................. 309
Figure 178 SECURITY > ANTI-SPAM > General ..................................................................................311
Figure 179 SECURITY > ANTI-SPAM > External DB .......................................................................... 314
Figure 180 SECURITY > ANTI-SPAM > Lists ...................................................................................... 316
Figure 181 SECURITY > ANTI-SPAM > Lists > Edit ........................................................................... 317
Figure 182 Content Filtering Lookup Procedure ................................................................................... 322
Figure 183 SECURITY > CONTENT FILTER > General ...................................................................... 323
Figure 184 SECURITY > CONTENT FILTER > Policy ......................................................................... 326
Figure 185 SECURITY > CONTENT FILTER > Policy > General ........................................................ 328
Figure 186 SECURITY > CONTENT FILTER > Policy > External Database ....................................... 329
Figure 187 SECURITY > CONTENT FILTER > Policy > Customization .............................................. 336
Figure 188 SECURITY > CONTENT FILTER > Policy > Schedule ...................................................... 338
Figure 189 SECURITY > CONTENT FILTER > Object ........................................................................ 339
Figure 190 SECURITY > CONTENT FILTER > Cache ........................................................................ 341
Figure 191 myZyXEL.com: Login ......................................................................................................... 344
Figure 192 myZyXEL.com: Welcome ................................................................................................... 344
Figure 193 myZyXEL.com: Service Management ................................................................................ 345
Figure 194 Blue Coat: Login ................................................................................................................. 345
Figure 195 Content Filtering Reports Main Screen .............................................................................. 346
Figure 196 Blue Coat: Report Home .................................................................................................... 346
Figure 197 Global Report Screen Example .......................................................................................... 347
Figure 198 Requested URLs Example ................................................................................................. 348
Figure 199 Web Page Review Process Screen ................................................................................... 349
Figure 200 VPN: Example .................................................................................................................... 351
Figure 201 VPN: IKE SA and IPSec SA .............................................................................................. 352
Figure 202 Gateway and Network Policies .......................................................................................... 353
Figure 203 IPSec Fields Summary ..................................................................................................... 353
Figure 204 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 354
Figure 207 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 357
Figure 208 VPN/NAT Example ............................................................................................................. 359
Figure 209 IPSec High Availability ....................................................................................................... 361
Figure 210 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 363
35
ZyWALL 5/35/70 Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents