List of Figures
Figure 125 Default Block Traffic From WAN to DMZ Example .........................................................
193
Figure 126 From LAN to VPN Example ...............................................................................................
195
Figure 127 Block DMZ to VPN Traffic by Default Example ...............................................................
196
Figure 128 From VPN to LAN Example ...............................................................................................
197
Figure 129 Block VPN to LAN Traffic by Default Example .................................................................
Figure 130 From VPN to VPN Example ..............................................................................................
198
Figure 131 Block VPN to VPN Traffic by Default Example ...............................................................
199
Figure 132 Blocking All LAN to WAN IRC Traffic Example ..................................................................
200
Figure 133 Limited LAN to WAN IRC Traffic Example ..........................................................................
201
Figure 134 Using IP Alias to Solve the Triangle Route Problem ..........................................................
202
Figure 135 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................
203
Figure 136 SECURITY > FIREWALL > Default Rule (Bridge Mode) ....................................................
205
Figure 137 SECURITY > FIREWALL > Rule Summary .......................................................................
207
Figure 138 SECURITY > FIREWALL > Rule Summary > Edit ............................................................
209
Figure 139 SECURITY > FIREWALL > Anti-Probing ............................................................................
211
Figure 140 Three-Way Handshake .......................................................................................................
212
Figure 141 SECURITY > FIREWALL > Threshold ............................................................................
213
Figure 142 SECURITY > FIREWALL > Service ...................................................................................
215
Figure 143 Firewall Edit Custom Service .............................................................................................
216
Figure 144 My Service Firewall Rule Example: Service ......................................................................
217
Figure 145 My Service Firewall Rule Example: Edit Custom Service .................................................
Figure 146 My Service Firewall Rule Example: Rule Summary ...........................................................
218
Figure 147 My Service Firewall Rule Example: Rule Edit: Source and Destination Addresses ..........
Figure 148 My Service Firewall Rule Example: Edit Rule: Service Configuration ................................
220
Figure 149 My Service Firewall Rule Example: Rule Summary: Completed ........................................
221
Figure 150 Content Filtering Lookup Procedure ...................................................................................
224
Figure 151 SECURITY > CONTENT FILTER > General ......................................................................
225
Figure 152 SECURITY > CONTENT FILTER > Policy .........................................................................
228
Figure 153 SECURITY > CONTENT FILTER > Policy > General ........................................................
229
Figure 154 SECURITY > CONTENT FILTER > Policy > External Database .......................................
231
Figure 155 SECURITY > CONTENT FILTER > Policy > Customization ..............................................
238
Figure 156 SECURITY > CONTENT FILTER > Policy > Schedule ......................................................
240
Figure 157 SECURITY > CONTENT FILTER > Object ........................................................................
241
Figure 158 SECURITY > CONTENT FILTER > Cache ........................................................................
244
Figure 159 myZyXEL.com: Login .........................................................................................................
246
Figure 160 myZyXEL.com: Welcome ...................................................................................................
Figure 161 myZyXEL.com: Service Management ................................................................................
247
Figure 162 Blue Coat: Login .................................................................................................................
Figure 163 Content Filtering Reports Main Screen ..............................................................................
248
Figure 164 Blue Coat: Report Home ....................................................................................................
Figure 165 Global Report Screen Example ..........................................................................................
249
Figure 166 Requested URLs Example .................................................................................................
250
Figure 167 Web Page Review Process Screen ...................................................................................
251
30
ZyWALL 2 Plus User’s Guide