ZyXEL Communications ZyWALL 2Plus User Manual page 38

Internet security appliance
Hide thumbs Also See for ZyWALL 2Plus:
Table of Contents

Advertisement

ZyWALL 2 Plus User's Guide
Table 39 Rule Summary ..................................................................................................... 138
Table 40 Firewall Edit Rule ................................................................................................. 141
Table 41 Anti-Probing ......................................................................................................... 143
Table 42 Firewall Threshold ............................................................................................... 145
Table 43 Firewall Service ................................................................................................... 147
Table 44 Firewall Edit Custom Service ............................................................................... 148
Table 45 Content Filter: General ........................................................................................ 156
Table 46 Content Filter: Categories .................................................................................... 159
Table 47 Content Filter: Customization .............................................................................. 166
Table 48 Content Filter: Cache ........................................................................................... 169
Table 49 VPN Example: Matching ID Type and Content .................................................... 184
Table 50 VPN Example: Mismatching ID Type and Content .............................................. 184
Table 52 VPN: Transport and Tunnel Mode Encapsulation ............................................... 189
Table 54 VPN Rules (IKE) .................................................................................................. 193
Table 55 VPN Rules (IKE): Gateway Policy: Edit ............................................................... 196
Table 56 VPN Rules (IKE): Network Policy Edit ................................................................. 202
Table 57 VPN Rules (IKE): Network Policy Move .............................................................. 205
Table 58 VPN Rules (Manual) ............................................................................................ 206
Table 59 VPN Rules (Manual) Edit ..................................................................................... 208
Table 60 VPN: SA Monitor ................................................................................................. 211
Table 61 VPN: Global Setting ............................................................................................. 212
Table 62 Telecommuters Sharing One VPN Rule Example ............................................... 214
Table 63 Telecommuters Using Unique VPN Rules Example ............................................ 215
Table 64 My Certificates ..................................................................................................... 219
Table 65 My Certificate Import ........................................................................................... 222
Table 66 My Certificate Create ........................................................................................... 223
Table 67 My Certificate Details ........................................................................................... 226
Table 68 Trusted CAs ......................................................................................................... 228
Table 69 Trusted CA Import ............................................................................................... 229
Table 70 Trusted CA Details ............................................................................................... 231
Table 71 Trusted Remote Hosts ......................................................................................... 233
Table 72 Trusted Remote Host Import ............................................................................... 236
Table 73 Trusted Remote Host Details ............................................................................... 237
Table 74 Directory Servers ................................................................................................. 240
Table 75 Directory Server Add ........................................................................................... 241
Table 76 Local User Database ........................................................................................... 246
Table 77 RADIUS ............................................................................................................... 247
Table 78 NAT Definitions .................................................................................................... 249
Table 79 NAT Application With IP Alias .............................................................................. 251
Table 80 NAT Mapping Types ............................................................................................ 253
Table 81 NAT Overview ...................................................................................................... 254
38
List of Tables

Advertisement

Table of Contents
loading

Table of Contents