List of Figures

Figure 168 My Service Firewall Rule Example: Rule Edit: Source and Destination Addresses ..........

268

Figure 169 My Service Firewall Rule Example: Edit Rule: Service Configuration ................................

269

Figure 170 My Service Firewall Rule Example: Rule Summary: Completed ........................................

270

Figure 171 Content Filtering Lookup Procedure ...................................................................................

272

Figure 172 SECURITY > CONTENT FILTER > General ......................................................................

273

Figure 173 SECURITY > CONTENT FILTER > Policy .........................................................................

276

Figure 174 SECURITY > CONTENT FILTER > Policy > General ........................................................

277

Figure 175 SECURITY > CONTENT FILTER > Policy > External Database .......................................

279

Figure 176 SECURITY > CONTENT FILTER > Policy > Customization ..............................................

286

Figure 177 SECURITY > CONTENT FILTER > Policy > Schedule ......................................................

288

Figure 178 SECURITY > CONTENT FILTER > Object ........................................................................

289

Figure 179 SECURITY > CONTENT FILTER > Cache ........................................................................

292

Figure 180 myZyXEL.com: Login .........................................................................................................

294

Figure 181 myZyXEL.com: Welcome ...................................................................................................

294

Figure 182 myZyXEL.com: Service Management ................................................................................

295

Figure 183 Blue Coat: Login .................................................................................................................

295

Figure 184 Content Filtering Reports Main Screen ..............................................................................

296

Figure 185 Blue Coat: Report Home ....................................................................................................

296

Figure 186 Global Report Screen Example ..........................................................................................

297

Figure 187 Requested URLs Example .................................................................................................

298

Figure 188 Web Page Review Process Screen ...................................................................................

299

Figure 189 VPN: Example ....................................................................................................................

301

Figure 190 VPN: IKE SA and IPSec SA ..............................................................................................

302

Figure 191 Gateway and Network Policies ..........................................................................................

303

Figure 192 IPSec Fields Summary .....................................................................................................

303

Figure 193 SECURITY > VPN > VPN Rules (IKE) ..............................................................................

304

Figure 194 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .........................................

305

Figure 195 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ......................................

306

Figure 196 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication .............................................

306

Figure 197 VPN/NAT Example .............................................................................................................

309

Figure 198 IPSec High Availability ........................................................................................................

311

Figure 199 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy .........................................

313

Figure 200 Virtual Mapping of Local and Remote Network IP Addresses ............................................

319

Figure 201 VPN: Transport and Tunnel Mode Encapsulation ..............................................................

320

Figure 202 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ...........................................

322

Figure 203 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding .............

327

Figure 204 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................

328

Figure 205 VPN Rule Configured .........................................................................................................

329

Figure 206 VPN Dial .............................................................................................................................

329

Figure 207 VPN Tunnel Established .....................................................................................................

330

Figure 208 VPN Log Example .............................................................................................................

331

Figure 209 IKE/IPSec Debug Example ...............................................................................................

332

Figure 210 SECURITY > VPN > VPN Rules (Manual) ........................................................................

334

ZyWALL 2WG User’s Guide

33