List of Figures
Figure 168 My Service Firewall Rule Example: Rule Edit: Source and Destination Addresses ..........
268
Figure 169 My Service Firewall Rule Example: Edit Rule: Service Configuration ................................
269
Figure 170 My Service Firewall Rule Example: Rule Summary: Completed ........................................
270
Figure 171 Content Filtering Lookup Procedure ...................................................................................
272
Figure 172 SECURITY > CONTENT FILTER > General ......................................................................
273
Figure 173 SECURITY > CONTENT FILTER > Policy .........................................................................
276
Figure 174 SECURITY > CONTENT FILTER > Policy > General ........................................................
277
Figure 175 SECURITY > CONTENT FILTER > Policy > External Database .......................................
279
Figure 176 SECURITY > CONTENT FILTER > Policy > Customization ..............................................
286
Figure 177 SECURITY > CONTENT FILTER > Policy > Schedule ......................................................
288
Figure 178 SECURITY > CONTENT FILTER > Object ........................................................................
289
Figure 179 SECURITY > CONTENT FILTER > Cache ........................................................................
292
Figure 180 myZyXEL.com: Login .........................................................................................................
294
Figure 181 myZyXEL.com: Welcome ...................................................................................................
Figure 182 myZyXEL.com: Service Management ................................................................................
295
Figure 183 Blue Coat: Login .................................................................................................................
Figure 184 Content Filtering Reports Main Screen ..............................................................................
296
Figure 185 Blue Coat: Report Home ....................................................................................................
Figure 186 Global Report Screen Example ..........................................................................................
297
Figure 187 Requested URLs Example .................................................................................................
298
Figure 188 Web Page Review Process Screen ...................................................................................
299
Figure 189 VPN: Example ....................................................................................................................
301
Figure 190 VPN: IKE SA and IPSec SA ..............................................................................................
302
Figure 191 Gateway and Network Policies ..........................................................................................
303
Figure 192 IPSec Fields Summary .....................................................................................................
Figure 193 SECURITY > VPN > VPN Rules (IKE) ..............................................................................
304
Figure 194 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .........................................
305
Figure 195 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ......................................
306
Figure 196 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication .............................................
Figure 197 VPN/NAT Example .............................................................................................................
309
Figure 198 IPSec High Availability ........................................................................................................
311
Figure 199 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy .........................................
313
Figure 200 Virtual Mapping of Local and Remote Network IP Addresses ............................................
319
Figure 201 VPN: Transport and Tunnel Mode Encapsulation ..............................................................
320
Figure 202 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ...........................................
322
Figure 203 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding .............
327
Figure 204 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................
328
Figure 205 VPN Rule Configured .........................................................................................................
329
Figure 206 VPN Dial .............................................................................................................................
Figure 207 VPN Tunnel Established .....................................................................................................
330
Figure 208 VPN Log Example .............................................................................................................
331
Figure 209 IKE/IPSec Debug Example ...............................................................................................
332
Figure 210 SECURITY > VPN > VPN Rules (Manual) ........................................................................
334
ZyWALL 2WG User’s Guide
33