ZyWALL 5/35/70 Series User’s Guide

Figure 125 Anti-Spam: General ...........................................................................................

270

Figure 126 Anti-Spam: External DB ....................................................................................

272

Figure 127 Anti-Spam: Lists ................................................................................................

274

Figure 128 Anti-Spam Rule Edit .........................................................................................

275

Figure 129 Content Filter : General .....................................................................................

279

Figure 130 Content Filtering Lookup Procedure .................................................................

281

Figure 131 Content Filter : Categories ................................................................................

282

Figure 132 Content Filter: Customization ............................................................................

288

Figure 133 Content Filter: Cache ........................................................................................

291

Figure 134 myZyXEL.com: Login ........................................................................................

295

Figure 135 myZyXEL.com: Welcome ..................................................................................

295

Figure 136 myZyXEL.com: Service Management ...............................................................

296

Figure 137 Blue Coat: Login ...............................................................................................

296

Figure 138 Content Filtering Reports Main Screen .............................................................

297

Figure 139 Blue Coat: Report Home ...................................................................................

297

Figure 140 Global Report Screen Example ........................................................................

298

Figure 141 Requested URLs Example ................................................................................

299

Figure 142 Web Page Review Process Screen ..................................................................

300

Figure 143 Encryption and Decryption ................................................................................

303

Figure 144 IPSec Architecture ............................................................................................

304

Figure 145 Transport and Tunnel Mode IPSec Encapsulation ............................................

305

Figure 146 NAT Router Between IPSec Routers ................................................................

311

Figure 147 Two Phases to Set Up the IPSec SA ................................................................

313

Figure 148 VPN Rules (IKE) ...............................................................................................

316

Figure 149 Gateway and Network Policies ........................................................................

317

Figure 150 IPSec Fields Summary ...................................................................................

317

Figure 151 VPN Rules (IKE): Gateway Policy: Edit ..........................................................

319

Figure 152 VPN Rules (IKE): Network Policy Edit .............................................................

325

Figure 153 VPN Rules (IKE): Network Policy Move ...........................................................

329

Figure 154 VPN Rules (Manual) ........................................................................................

330

Figure 155 VPN Rules (Manual): Edit ................................................................................

332

Figure 156 VPN: SA Monitor ...............................................................................................

335

Figure 157 VPN: Global Setting ..........................................................................................

336

Figure 158 Telecommuters Sharing One VPN Rule Example .............................................

338

Figure 159 Telecommuters Using Unique VPN Rules Example .........................................

339

Figure 160 Certificate Configuration Overview ...................................................................

343

Figure 161 My Certificates .................................................................................................

344

Figure 162 My Certificate Import .........................................................................................

347

Figure 163 My Certificate Create ........................................................................................

348

Figure 164 My Certificate Details ........................................................................................

351

Figure 165 Trusted CAs ......................................................................................................

354

Figure 166 Trusted CA Import .............................................................................................

355

Figure 167 Trusted CA Details ............................................................................................

357

35

List of Figures