List of Figures

 

 

Figure 125 Default Block Traffic From WAN to DMZ Example .........................................................

193

Figure 126 From LAN to VPN Example ...............................................................................................

195

Figure 127 Block DMZ to VPN Traffic by Default Example ...............................................................

196

Figure 128 From VPN to LAN Example ...............................................................................................

197

Figure 129 Block VPN to LAN Traffic by Default Example .................................................................

197

Figure 130 From VPN to VPN Example ..............................................................................................

198

Figure 131 Block VPN to VPN Traffic by Default Example ...............................................................

199

Figure 132 Blocking All LAN to WAN IRC Traffic Example ..................................................................

200

Figure 133 Limited LAN to WAN IRC Traffic Example ..........................................................................

201

Figure 134 Using IP Alias to Solve the Triangle Route Problem ..........................................................

202

Figure 135 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................

203

Figure 136 SECURITY > FIREWALL > Default Rule (Bridge Mode) ....................................................

205

Figure 137 SECURITY > FIREWALL > Rule Summary .......................................................................

207

Figure 138 SECURITY > FIREWALL > Rule Summary > Edit ............................................................

209

Figure 139 SECURITY > FIREWALL > Anti-Probing ............................................................................

211

Figure 140 Three-Way Handshake .......................................................................................................

212

Figure 141 SECURITY > FIREWALL > Threshold ............................................................................

213

Figure 142 SECURITY > FIREWALL > Service ...................................................................................

215

Figure 143 Firewall Edit Custom Service .............................................................................................

216

Figure 144 My Service Firewall Rule Example: Service ......................................................................

217

Figure 145 My Service Firewall Rule Example: Edit Custom Service .................................................

217

Figure 146 My Service Firewall Rule Example: Rule Summary ...........................................................

218

Figure 147 My Service Firewall Rule Example: Rule Edit: Source and Destination Addresses ..........

218

Figure 148 My Service Firewall Rule Example: Edit Rule: Service Configuration ................................

220

Figure 149 My Service Firewall Rule Example: Rule Summary: Completed ........................................

221

Figure 150 Content Filtering Lookup Procedure ...................................................................................

224

Figure 151 SECURITY > CONTENT FILTER > General ......................................................................

225

Figure 152 SECURITY > CONTENT FILTER > Policy .........................................................................

228

Figure 153 SECURITY > CONTENT FILTER > Policy > General ........................................................

229

Figure 154 SECURITY > CONTENT FILTER > Policy > External Database .......................................

231

Figure 155 SECURITY > CONTENT FILTER > Policy > Customization ..............................................

238

Figure 156 SECURITY > CONTENT FILTER > Policy > Schedule ......................................................

240

Figure 157 SECURITY > CONTENT FILTER > Object ........................................................................

241

Figure 158 SECURITY > CONTENT FILTER > Cache ........................................................................

244

Figure 159 myZyXEL.com: Login .........................................................................................................

246

Figure 160 myZyXEL.com: Welcome ...................................................................................................

246

Figure 161 myZyXEL.com: Service Management ................................................................................

247

Figure 162 Blue Coat: Login .................................................................................................................

247

Figure 163 Content Filtering Reports Main Screen ..............................................................................

248

Figure 164 Blue Coat: Report Home ....................................................................................................

248

Figure 165 Global Report Screen Example ..........................................................................................

249

Figure 166 Requested URLs Example .................................................................................................

250

Figure 167 Web Page Review Process Screen ...................................................................................

251

30

ZyWALL 2 Plus User’s Guide