ZyXEL Communications 5 Series User Manual page 43

Internet security appliance
Table of Contents

Advertisement

List of Tables
Table 82 SECURITY > IDP > Signature: Query View .......................................................................... 285
Table 83 SECURITY > IDP > Anomaly ................................................................................................ 290
Table 84 SECURITY > IDP > Update .................................................................................................. 292
Table 85 SECURITY > ANTI-VIRUS > General .................................................................................. 302
Table 86 SECURITY > ANTI-VIRUS > Signature: Query View ........................................................... 304
Table 87 Common Computer Virus Types ........................................................................................... 310
Table 88 SECURITY > ANTI-SPAM > General ................................................................................... 316
Table 89 SECURITY > ANTI-SPAM > External DB ............................................................................. 319
Table 90 SECURITY > ANTI-SPAM > Lists ......................................................................................... 321
Table 91 SECURITY > ANTI-SPAM > Lists > Edit ............................................................................... 323
Table 92 SECURITY > CONTENT FILTER > General ........................................................................ 329
Table 93 SECURITY > CONTENT FILTER > Policy ........................................................................... 332
Table 94 SECURITY > CONTENT FILTER > Policy > General ........................................................... 333
Table 95 SECURITY > CONTENT FILTER > Policy > External Database .......................................... 335
Table 96 SECURITY > CONTENT FILTER > Policy > Customization ................................................. 342
Table 97 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................ 343
Table 98 SECURITY > CONTENT FILTER > Object ........................................................................... 345
Table 99 SECURITY > CONTENT FILTER > Cache ........................................................................... 346
Table 100 SECURITY > VPN > VPN Rules (IKE) ............................................................................... 360
Table 101 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ........................................... 363
Table 102 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ............................................ 369
Table 104 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy .......................................... 374
Table 105 SECURITY > VPN > VPN Rules (Manual) ......................................................................... 375
Table 106 SECURITY > VPN > VPN Rules (Manual) > Edit ............................................................... 377
Table 107 SECURITY > VPN > SA Monitor ........................................................................................ 379
Table 108 SECURITY > VPN > Global Setting .................................................................................... 381
Table 109 Telecommuters Sharing One VPN Rule Example ............................................................... 383
Table 110 Telecommuters Using Unique VPN Rules Example ............................................................ 384
Table 111 VPN Example: Matching ID Type and Content .................................................................... 390
Table 112 VPN Example: Mismatching ID Type and Content .............................................................. 390
Table 113 SECURITY > CERTIFICATES > My Certificates ................................................................ 402
Table 114 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 404
Table 115 SECURITY > CERTIFICATES > My Certificates > Export .................................................. 406
Table 116 SECURITY > CERTIFICATES > My Certificates > Import .................................................. 408
Table 118 SECURITY > CERTIFICATES > My Certificates > Create .................................................. 410
Table 119 SECURITY > CERTIFICATES > Trusted CAs .................................................................... 414
Table 120 SECURITY > CERTIFICATES > Trusted CAs > Details ..................................................... 416
Table 121 SECURITY > CERTIFICATES > Trusted CAs Import ......................................................... 419
Table 122 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 420
43
ZyWALL 5/35/70 Series User's Guide

Advertisement

Table of Contents
loading

Table of Contents