List of Tables
Table 39 NETWORK > DMZ > Static DHCP ........................................................................................
175
Table 40 NETWORK > DMZ > IP Alias ...............................................................................................
176
Table 41 NETWORK > DMZ > Port Roles ...........................................................................................
179
Table 42 NETWORK > WLAN .............................................................................................................
182
Table 43 NETWORK > WLAN > Static DHCP .....................................................................................
185
Table 44 NETWORK > WLAN > IP Alias .............................................................................................
186
Table 45 NETWORK > WLAN > Port Roles ........................................................................................
188
Table 46 Blocking All LAN to WAN IRC Traffic Example .....................................................................
200
Table 47 Limited LAN to WAN IRC Traffic Example ............................................................................
201
Table 48 SECURITY > FIREWALL > Default Rule (Router Mode) ......................................................
203
Table 49 SECURITY > FIREWALL > Default Rule (Bridge Mode) ......................................................
205
Table 50 SECURITY > FIREWALL > Rule Summary ..........................................................................
207
Table 51 SECURITY > FIREWALL > Rule Summary > Edit ................................................................
210
Table 52 SECURITY > FIREWALL > Anti-Probing ..............................................................................
212
Table 53 SECURITY > FIREWALL > Threshold ..................................................................................
214
Table 54 SECURITY > FIREWALL > Service ......................................................................................
215
Table 55 SECURITY > FIREWALL > Service > Add ...........................................................................
216
Table 56 SECURITY > CONTENT FILTER > General ........................................................................
225
Table 57 SECURITY > CONTENT FILTER > Policy ...........................................................................
228
Table 58 SECURITY > CONTENT FILTER > Policy > General ...........................................................
229
Table 59 SECURITY > CONTENT FILTER > Policy > External Database ..........................................
231
Table 60 SECURITY > CONTENT FILTER > Policy > Customization .................................................
238
Table 61 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................
240
Table 62 SECURITY > CONTENT FILTER > Object ...........................................................................
241
Table 63 SECURITY > CONTENT FILTER > Cache ...........................................................................
244
Table 64 SECURITY > VPN > VPN Rules (IKE) .................................................................................
256
Table 65 VPN Example: Matching ID Type and Content .....................................................................
259
Table 66 VPN Example: Mismatching ID Type and Content ...............................................................
Table 67 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy .............................................
266
Table 68 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ..............................................
275
Table 69 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding .................
279
Table 70 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................
280
Table 71 SECURITY > VPN > VPN Rules (Manual) ...........................................................................
282
Table 72 SECURITY > VPN > VPN Rules (Manual) > Edit .................................................................
283
Table 73 SECURITY > VPN > SA Monitor ..........................................................................................
286
Table 74 SECURITY > VPN > Global Setting ......................................................................................
288
Table 75 Telecommuters Sharing One VPN Rule Example .................................................................
290
Table 76 Telecommuters Using Unique VPN Rules Example .............................................................
291
Table 77 SECURITY > CERTIFICATES > My Certificates ..................................................................
298
Table 78 SECURITY > CERTIFICATES > My Certificates > Details ...................................................
300
Table 79 SECURITY > CERTIFICATES > My Certificates > Export ....................................................
303
Table 80 SECURITY > CERTIFICATES > My Certificates > Import ....................................................
304
Table 81 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ..................................
305
40
ZyWALL 2 Plus User’s Guide