ZyXEL Communications 5 Series User Manual page 30

Internet security appliance
Table of Contents

Advertisement

List of Figures
Figure 39 VPN Wizard Setup Complete ............................................................................................... 104
Figure 40 Anti-Spam Wizard: Email Server Location Setting .............................................................. 105
Figure 41 Anti-Spam Wizard: Direction Recommendations ................................................................. 106
Figure 42 Anti-Spam Wizard: Direction Configuration .......................................................................... 107
Figure 43 Anti-Spam Wizard: Setup Complete ..................................................................................... 108
Figure 44 Dynamic VPN Rule Example ................................................................................................ 109
Figure 45 VPN Gateway Policy Edit Screens ........................................................................................112
Figure 46 SECURITY > VPN > Add Network Policy (ZyWALL A) .........................................................113
Figure 47 VPN Network Policy Edit Screens .........................................................................................114
Figure 48 Activate VPN Rule (ZyWALL B) ...........................................................................................115
Figure 49 Tutorial: VPN Summary Screens Comparison Example .......................................................116
Figure 50 Check The Telecommuter's Computer IP Address ...............................................................117
Figure 51 Telecommuter Pinging a Network X IP Address Example .....................................................118
Figure 52 Additional Dynamic VPN Rules Example ..............................................................................119
Figure 53 IDP for From VPN Traffic ...................................................................................................... 120
Figure 54 IDP Configuration for Traffic From VPN ............................................................................... 121
Figure 55 IDP for To VPN Traffic .......................................................................................................... 121
Figure 56 IDP Configuration for To VPN Traffic .................................................................................... 122
Figure 57 Firewall Rule for VPN ........................................................................................................... 123
Figure 58 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 123
........................................... 124
Figure 61 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy ............................................. 126
Figure 62 SECURITY > FIREWALL > Rule Summary ......................................................................... 127
Figure 63 SECURITY > FIREWALL > Rule Summary > Edit: Allow ................................................... 128
Figure 64 SECURITY > FIREWALL > Rule Summary: Allow ............................................................... 129
....................................................................... 131
Figure 67 Tutorial: Home ..................................................................................................................... 132
............................................................................. 133
Figure 69 SECURITY > CONTENT FILTER > General ........................................................................ 134
Figure 70 SECURITY > CONTENT FILTER > Policy ........................................................................... 135
Figure 72 HOME > Show DHCP Table ................................................................................................. 136
Figure 73 SECURITY > CONTENT FILTER > Policy ........................................................................... 136
Figure 74 SECURITY > CONTENT FILTER > Policy > Insert .............................................................. 137
Figure 75 SECURITY > CONTENT FILTER > Policy ........................................................................... 137
Figure 76 SECURITY > CONTENT FILTER > Policy > Schedule (Bob) .............................................. 138
Figure 77 SECURITY > CONTENT FILTER > Policy ........................................................................... 138
Figure 79 REGISTRATION > Registration ........................................................................................... 143
Figure 80 REGISTRATION > Registration: Registered Device ............................................................ 144
Figure 81 REGISTRATION > Service ................................................................................................... 145
30
ZyWALL 5/35/70 Series User's Guide

Advertisement

Table of Contents
loading

Table of Contents