List of Tables

 

 

Table 39 NETWORK > DMZ > Static DHCP ........................................................................................

175

Table 40 NETWORK > DMZ > IP Alias ...............................................................................................

176

Table 41 NETWORK > DMZ > Port Roles ...........................................................................................

179

Table 42 NETWORK > WLAN .............................................................................................................

182

Table 43 NETWORK > WLAN > Static DHCP .....................................................................................

185

Table 44 NETWORK > WLAN > IP Alias .............................................................................................

186

Table 45 NETWORK > WLAN > Port Roles ........................................................................................

188

Table 46 Blocking All LAN to WAN IRC Traffic Example .....................................................................

200

Table 47 Limited LAN to WAN IRC Traffic Example ............................................................................

201

Table 48 SECURITY > FIREWALL > Default Rule (Router Mode) ......................................................

203

Table 49 SECURITY > FIREWALL > Default Rule (Bridge Mode) ......................................................

205

Table 50 SECURITY > FIREWALL > Rule Summary ..........................................................................

207

Table 51 SECURITY > FIREWALL > Rule Summary > Edit ................................................................

210

Table 52 SECURITY > FIREWALL > Anti-Probing ..............................................................................

212

Table 53 SECURITY > FIREWALL > Threshold ..................................................................................

214

Table 54 SECURITY > FIREWALL > Service ......................................................................................

215

Table 55 SECURITY > FIREWALL > Service > Add ...........................................................................

216

Table 56 SECURITY > CONTENT FILTER > General ........................................................................

225

Table 57 SECURITY > CONTENT FILTER > Policy ...........................................................................

228

Table 58 SECURITY > CONTENT FILTER > Policy > General ...........................................................

229

Table 59 SECURITY > CONTENT FILTER > Policy > External Database ..........................................

231

Table 60 SECURITY > CONTENT FILTER > Policy > Customization .................................................

238

Table 61 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................

240

Table 62 SECURITY > CONTENT FILTER > Object ...........................................................................

241

Table 63 SECURITY > CONTENT FILTER > Cache ...........................................................................

244

Table 64 SECURITY > VPN > VPN Rules (IKE) .................................................................................

256

Table 65 VPN Example: Matching ID Type and Content .....................................................................

259

Table 66 VPN Example: Mismatching ID Type and Content ...............................................................

259

Table 67 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy .............................................

266

Table 68 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ..............................................

275

Table 69 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding .................

279

Table 70 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................

280

Table 71 SECURITY > VPN > VPN Rules (Manual) ...........................................................................

282

Table 72 SECURITY > VPN > VPN Rules (Manual) > Edit .................................................................

283

Table 73 SECURITY > VPN > SA Monitor ..........................................................................................

286

Table 74 SECURITY > VPN > Global Setting ......................................................................................

288

Table 75 Telecommuters Sharing One VPN Rule Example .................................................................

290

Table 76 Telecommuters Using Unique VPN Rules Example .............................................................

291

Table 77 SECURITY > CERTIFICATES > My Certificates ..................................................................

298

Table 78 SECURITY > CERTIFICATES > My Certificates > Details ...................................................

300

Table 79 SECURITY > CERTIFICATES > My Certificates > Export ....................................................

303

Table 80 SECURITY > CERTIFICATES > My Certificates > Import ....................................................

304

Table 81 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ..................................

305

40

ZyWALL 2 Plus User’s Guide