List of Tables

Table 82 SECURITY > CONTENT FILTER > Object ...........................................................................

289

Table 83 SECURITY > CONTENT FILTER > Cache ...........................................................................

292

Table 84 SECURITY > VPN > VPN Rules (IKE) .................................................................................

304

Table 85 VPN Example: Matching ID Type and Content .....................................................................

307

Table 86 VPN Example: Mismatching ID Type and Content ...............................................................

307

Table 87 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy .............................................

314

Table 88 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ..............................................

323

Table 89 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding .................

327

Table 90 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................

328

Table 91 SECURITY > VPN > VPN Rules (Manual) ...........................................................................

334

Table 92 SECURITY > VPN > VPN Rules (Manual) > Edit .................................................................

335

Table 93 SECURITY > VPN > SA Monitor ..........................................................................................

338

Table 94 SECURITY > VPN > Global Setting ......................................................................................

340

Table 95 Telecommuters Sharing One VPN Rule Example .................................................................

342

Table 96 Telecommuters Using Unique VPN Rules Example .............................................................

343

Table 97 SECURITY > CERTIFICATES > My Certificates ..................................................................

352

Table 98 SECURITY > CERTIFICATES > My Certificates > Details ...................................................

354

Table 99 SECURITY > CERTIFICATES > My Certificates > Export ....................................................

356

Table 100 SECURITY > CERTIFICATES > My Certificates > Import ..................................................

358

Table 101 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ................................

359

Table 102 SECURITY > CERTIFICATES > My Certificates > Create .................................................

361

Table 103 SECURITY > CERTIFICATES > Trusted CAs ....................................................................

365

Table 104 SECURITY > CERTIFICATES > Trusted CAs > Details .....................................................

367

Table 105 SECURITY > CERTIFICATES > Trusted CAs Import .........................................................

370

Table 106 SECURITY > CERTIFICATES > Trusted Remote Hosts ....................................................

371

Table 107 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ......................................

372

Table 108 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details .....................................

374

Table 109 SECURITY > CERTIFICATES > Directory Servers ............................................................

376

Table 110 SECURITY > CERTIFICATES > Directory Server > Add ....................................................

377

Table 111 SECURITY > AUTH SERVER > Local User Database .......................................................

381

Table 112 SECURITY > AUTH SERVER > RADIUS ...........................................................................

381

Table 113 NAT Definitions ....................................................................................................................

385

Table 114 NAT Mapping Types ............................................................................................................

389

Table 115 ADVANCED > NAT > NAT Overview ..................................................................................

390

Table 116 ADVANCED > NAT > Address Mapping .............................................................................

392

Table 117 ADVANCED > NAT > Address Mapping > Edit ...................................................................

394

Table 118 Services and Port Numbers ................................................................................................

395

Table 119 ADVANCED > NAT > Port Forwarding ................................................................................

398

Table 120 ADVANCED > NAT > Port Triggering .................................................................................

400

Table 121 ADVANCED > STATIC ROUTE > IP Static Route ..............................................................

403

Table 122 ADVANCED > STATIC ROUTE > IP Static Route > Edit ....................................................

403

Table 123 ADVANCED > POLICY ROUTE > Policy Route Summary .................................................

407

Table 124 ADVANCED > POLICY ROUTE > Edit ...............................................................................

408

ZyWALL 2WG User’s Guide

45