ZyXEL Communications ZyWall 35 Support Notes page 263

Zyxel zywall 35: user guide
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

How a PHISHING mail looked like as it was received?
2.3.1
According to the above settings, if the user behind the ZyWALL 5 UTM LAN zone that received a POP3
mail which is treated as phishing, the mail will be tagged "[PHISHING]" in the original mail subject
("Bank" is the original subject) and the new subject will looks like "[PHISHING]Bank" as listed below:
TIPS: An end user can apply the Junk Mail rule to the received phishing mail which are already tagged by
the ZyWALL 5 UTM AS engine.
*To apply the Junk Mail rule, please refer to the user guide of which mail client software you use.
2. Prevent non-business web surfing
Below is an example that demonstrates how to configure the ZyWALL 5 UTM CF service to prevent
employee from surfing websites that are not related to work.
Setting up the ZyWALL 5 UTM CF service to block the non-business web surfing.
2.1 The General settings:
1. In CONTETN FILTER ->General, check the Enable Content Filter check box to enable CF
function.
2. In Schedule to Block, select the Always Block to let CF engine to do blocking the websites all the
time.
3. In Message to display when a site is blocked, you can input the text, say "(Website Blocking)", to
remind the users that the website he is trying to access is blocked. And you can input the URL in the
Redirect URL field, for example, "www.zyxel.com" to redirect the original URL to this redirect-
URL.
4. In Exempt Computers, we can select Exclude specified address ranges from the content filter
enforcement to NOT apply content filter policies to the specified IP address ranges, for example, if the
CEO's computer which is assigned an IP address: 192.168.10.200 needed NOT to be applied by CF
engine, the IT staff can add this IP address 192.168.10.200 to the list to meet this exclusion
All contents copyright (c) 2006 ZyXEL Communications Corporation.
ZyWALL 35 Support Notes
263

Advertisement

Table of Contents
loading

Table of Contents