ZyXEL Communications ZYWALL P1 User Manual page 32

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

List of Tables
Table 39 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 151
Table 40 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 153
Table 41 SECURITY > FIREWALL > Rule Summary .......................................................................... 155
Table 42 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 158
Table 43 SECURITY > FIREWALL > Anti-Probing .............................................................................. 160
Table 44 SECURITY > FIREWALL > Threshold .................................................................................. 162
Table 45 SECURITY > FIREWALL > Service ...................................................................................... 165
Table 46 SECURITY > FIREWALL > Service > Add ........................................................................... 166
Table 47 SECURITY > IDP > General Setup ...................................................................................... 176
Table 48 SECURITY > IDP > Signature: Attack Types ........................................................................ 177
Table 49 SECURITY > IDP > Signature: Intrusion Severity ................................................................ 178
Table 50 SECURITY > IDP > Signature: Actions ................................................................................ 179
Table 51 SECURITY > IDP > Signature: Group View ......................................................................... 180
Table 52 SECURITY > IDP > Signature: Query View .......................................................................... 181
Table 53 SECURITY > IDP > Update .................................................................................................. 187
Table 54 Common Computer Virus Types ........................................................................................... 189
Table 55 SECURITY > ANTI-VIRUS > General .................................................................................. 192
Table 56 SECURITY > ANTI-VIRUS > Signature: Query View ........................................................... 194
Table 57 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 204
Table 58 VPN Example: Matching ID Type and Content ..................................................................... 207
Table 59 VPN Example: Mismatching ID Type and Content ............................................................... 208
Table 60 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................................. 214
Table 61 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy .............................................. 225
Table 63 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................ 230
Table 64 SECURITY > VPN > SA Monitor .......................................................................................... 234
Table 65 SECURITY > VPN > Global Setting ...................................................................................... 235
Table 66 Telecommuters Sharing One VPN Rule Example ................................................................. 236
Table 67 Telecommuters Using Unique VPN Rules Example ............................................................. 237
Table 68 SECURITY > CERTIFICATES > My Certificates .................................................................. 242
Table 69 SECURITY > CERTIFICATES > My Certificates > Details ................................................... 244
Table 70 SECURITY > CERTIFICATES > My Certificates > Export .................................................... 247
Table 71 SECURITY > CERTIFICATES > My Certificates > Import .................................................... 248
Table 73 SECURITY > CERTIFICATES > My Certificates > Create ................................................... 250
Table 74 SECURITY > CERTIFICATES > Trusted CAs ...................................................................... 252
Table 75 SECURITY > CERTIFICATES > Trusted CAs > Details ....................................................... 254
Table 76 SECURITY > CERTIFICATES > Trusted CAs Import ........................................................... 257
Table 77 SECURITY > CERTIFICATES > Trusted Remote Hosts ...................................................... 258
Table 78 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ........................................ 259
Table 79 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ....................................... 261
Table 80 SECURITY > CERTIFICATES > Directory Servers .............................................................. 263
Table 81 SECURITY > CERTIFICATES > Directory Server > Add ..................................................... 264
32
ZyWALL P1 User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents