ZyXEL Communications ZyWall 110 User Manual page 35

Security firewalls
Hide thumbs Also See for ZyWall 110:
Table of Contents

Advertisement

Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR LINK TAB
Layer 2
General
Isolation
White List
DNS Inbound
DNS Load
LB
Balancing
Web
Web Authentication
Authentication
SSO
RTLS
Real Time Location
System
Security Policy
Policy Control
Policy
ADP
General
Profile
Session
Session Control
Control
VPN
IPSec VPN
VPN Connection
VPN Gateway
Concentrator
Configuration
Provisioning
SSL VPN
Access Privilege
Global Setting
SecuExtender
L2TP VPN
L2TP VPN
BWM
BWM
AppPatrol
General
UTM Profile
AppPatrol
Profile
Content Filter
Profile
Trusted Web Sites
Forbidden Web
Sites
IDP
Profile
Custom Signatures
Anti-Virus
Profile
Chapter 1 Introduction
FUNCTION
Enable layer-2 isolation on the ZyWALL/USG and the internal
interface(s).
Enable and configure the white list.
Configure DNS Load Balancing.
Define a web portal and exempt services from authentication.
Configure the ZyWALL/USG to work with a Single Sign On agent.
Use the managed APs as part of an Ekahau RTLS to track the
location of Ekahau Wi-Fi tags.
Create and manage level-3 traffic rules and apply UTM profiles.
Display and manage ADP bindings.
Create and manage ADP profiles.
Limit the number of concurrent client NAT/security policy sessions.
Configure IPSec tunnels.
Configure IKE tunnels.
Combine IPSec VPN connections into a single secure network
Set who can retrieve VPN rule settings from the ZyWALL/USG
using the ZyWALL/USG IPSec VPN Client.
Configure SSL VPN access rights for users and groups.
Configure the ZyWALL/USG's SSL VPN settings that apply to all
connections.
Check for the latest version of the SecuExtender VPN client.
Configure L2TP over IPSec tunnels.
Enable and configure bandwidth management rules.
Enable or disable traffic management by application and see
registration and signature information.
Manage different types of traffic in this screen. Create App Patrol
template(s) of settings to apply to a traffic flow using a security
policy.
Create and manage the detailed filtering rules for content filtering
profiles and then apply to a traffic flow using a security policy.
Create a list of allowed web sites that bypass content filtering
policies.
Create a list of web sites to block regardless of content filtering
policies.
Create IDP template(s) of settings to apply to a traffic flow using a
security policy.
Create, import, or export custom signatures.
Create anti-virus template(s) of settings to apply to a traffic flow
using a security policy.
ZyWALL/USG Series User's Guide
35

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents