ZyXEL Communications ZYWALL 35 User Manual page 47

Internet security appliance
Hide thumbs Also See for ZYWALL 35:
Table of Contents

Advertisement

List of Tables
Table 82 SECURITY > IDP > Signature: Query View .......................................................................... 286
Table 83 SECURITY > IDP > Update .................................................................................................. 292
Table 84 Common Computer Virus Types ........................................................................................... 295
Table 85 SECURITY > ANTI-VIRUS > General .................................................................................. 299
Table 86 SECURITY > ANTI-VIRUS > Signature: Query View ........................................................... 301
Table 87 SECURITY > ANTI-SPAM > General ....................................................................................311
Table 88 SECURITY > ANTI-SPAM > External DB ............................................................................. 314
Table 89 SECURITY > ANTI-SPAM > Lists ......................................................................................... 316
Table 90 SECURITY > ANTI-SPAM > Lists > Edit ............................................................................... 318
Table 91 SECURITY > CONTENT FILTER > General ........................................................................ 323
Table 92 SECURITY > CONTENT FILTER > Policy ........................................................................... 326
Table 93 SECURITY > CONTENT FILTER > Policy > General ........................................................... 328
Table 94 SECURITY > CONTENT FILTER > Policy > External Database .......................................... 330
Table 95 SECURITY > CONTENT FILTER > Policy > Customization ................................................. 337
Table 96 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................ 338
Table 97 SECURITY > CONTENT FILTER > Object ........................................................................... 339
Table 98 SECURITY > CONTENT FILTER > Cache ........................................................................... 341
Table 99 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 354
Table 100 VPN Example: Matching ID Type and Content ................................................................... 357
Table 101 VPN Example: Mismatching ID Type and Content ............................................................. 358
Table 102 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ........................................... 364
Table 103 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ............................................ 374
Table 105 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy .......................................... 379
Table 106 SECURITY > VPN > VPN Rules (Manual) ......................................................................... 381
Table 107 SECURITY > VPN > VPN Rules (Manual) > Edit ............................................................... 382
Table 108 SECURITY > VPN > SA Monitor ........................................................................................ 385
Table 109 SECURITY > VPN > Global Setting .................................................................................... 387
Table 110 Telecommuters Sharing One VPN Rule Example ............................................................... 389
Table 111 Telecommuters Using Unique VPN Rules Example ............................................................ 390
Table 112 SECURITY > CERTIFICATES > My Certificates ................................................................ 398
Table 113 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 401
Table 114 SECURITY > CERTIFICATES > My Certificates > Export .................................................. 403
Table 115 SECURITY > CERTIFICATES > My Certificates > Import .................................................. 404
Table 117 SECURITY > CERTIFICATES > My Certificates > Create .................................................. 407
Table 118 SECURITY > CERTIFICATES > Trusted CAs .....................................................................411
Table 119 SECURITY > CERTIFICATES > Trusted CAs > Details ..................................................... 413
Table 120 SECURITY > CERTIFICATES > Trusted CAs Import ......................................................... 416
Table 121 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 417
Table 124 SECURITY > CERTIFICATES > Directory Servers ............................................................ 422
47
ZyWALL 5/35/70 Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents