ZyXEL Communications 5 Series User Manual page 33

Internet security appliance
Table of Contents

Advertisement

List of Figures
Figure 168 SECURITY > IDP > Signature: Query View ....................................................................... 285
Figure 169 SECURITY > IDP > Signature: Query by Partial Name ..................................................... 287
Figure 171 Signature Query by Attribute. ............................................................................................. 289
Figure 172 SECURITY > IDP > Anomaly ............................................................................................. 290
Figure 173 SECURITY > IDP > Update ............................................................................................... 292
Figure 174 SECURITY > IDP > Backup & Restore .............................................................................. 294
........................................................................................... 299
Figure 176 SECURITY > ANTI-VIRUS > General ............................................................................... 302
Figure 177 SECURITY > ANTI-VIRUS > Signature: Query View ......................................................... 304
Figure 178 Query Example Search Criteria .......................................................................................... 305
Figure 179 Query Example Search Results ......................................................................................... 306
Figure 180 SECURITY > ANTI-VIRUS > Update ................................................................................. 307
Figure 181 SECURITY > ANTI-VIRUS > Backup and Restore ............................................................ 309
Figure 182 Anti-spam Overview ........................................................................................................... 313
Figure 183 SECURITY > ANTI-SPAM > General ................................................................................. 316
Figure 184 SECURITY > ANTI-SPAM > External DB .......................................................................... 319
Figure 185 SECURITY > ANTI-SPAM > Lists ...................................................................................... 321
Figure 186 SECURITY > ANTI-SPAM > Lists > Edit ........................................................................... 322
Figure 187 Content Filtering Lookup Procedure ................................................................................... 328
Figure 188 SECURITY > CONTENT FILTER > General ...................................................................... 329
Figure 189 SECURITY > CONTENT FILTER > Policy ......................................................................... 331
Figure 190 SECURITY > CONTENT FILTER > Policy > General ........................................................ 333
Figure 191 SECURITY > CONTENT FILTER > Policy > External Database ....................................... 334
Figure 192 SECURITY > CONTENT FILTER > Policy > Customization .............................................. 341
Figure 193 SECURITY > CONTENT FILTER > Policy > Schedule ...................................................... 343
Figure 194 SECURITY > CONTENT FILTER > Object ........................................................................ 344
Figure 195 SECURITY > CONTENT FILTER > Cache ........................................................................ 346
Figure 196 myZyXEL.com: Login ......................................................................................................... 350
Figure 197 myZyXEL.com: Welcome ................................................................................................... 350
Figure 198 myZyXEL.com: Service Management ................................................................................ 351
Figure 199 Blue Coat: Login ................................................................................................................. 351
Figure 200 Content Filtering Reports Main Screen .............................................................................. 352
Figure 201 Blue Coat: Report Home .................................................................................................... 352
Figure 202 Global Report Screen Example .......................................................................................... 353
Figure 203 Requested URLs Example ................................................................................................. 354
Figure 204 Web Page Review Process Screen ................................................................................... 355
Figure 205 VPN: Example .................................................................................................................... 357
Figure 206 VPN: IKE SA and IPSec SA .............................................................................................. 358
Figure 207 Gateway and Network Policies .......................................................................................... 359
Figure 208 IPSec Fields Summary ...................................................................................................... 359
Figure 209 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 360
Figure 210 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 362
33
ZyWALL 5/35/70 Series User's Guide

Advertisement

Table of Contents
loading

Table of Contents