ZyWALL 5/35/70 Series User’s Guide
Figure 125 Anti-Spam: General ...........................................................................................
270
Figure 126 Anti-Spam: External DB ....................................................................................
272
Figure 127 Anti-Spam: Lists ................................................................................................
274
Figure 128 Anti-Spam Rule Edit .........................................................................................
275
Figure 129 Content Filter : General .....................................................................................
279
Figure 130 Content Filtering Lookup Procedure .................................................................
281
Figure 131 Content Filter : Categories ................................................................................
282
Figure 132 Content Filter: Customization ............................................................................
288
Figure 133 Content Filter: Cache ........................................................................................
291
Figure 134 myZyXEL.com: Login ........................................................................................
295
Figure 135 myZyXEL.com: Welcome ..................................................................................
Figure 136 myZyXEL.com: Service Management ...............................................................
296
Figure 137 Blue Coat: Login ...............................................................................................
Figure 138 Content Filtering Reports Main Screen .............................................................
297
Figure 139 Blue Coat: Report Home ...................................................................................
Figure 140 Global Report Screen Example ........................................................................
298
Figure 141 Requested URLs Example ................................................................................
299
Figure 142 Web Page Review Process Screen ..................................................................
300
Figure 143 Encryption and Decryption ................................................................................
303
Figure 144 IPSec Architecture ............................................................................................
304
Figure 145 Transport and Tunnel Mode IPSec Encapsulation ............................................
305
Figure 146 NAT Router Between IPSec Routers ................................................................
311
Figure 147 Two Phases to Set Up the IPSec SA ................................................................
313
Figure 148 VPN Rules (IKE) ...............................................................................................
316
Figure 149 Gateway and Network Policies ........................................................................
317
Figure 150 IPSec Fields Summary ...................................................................................
Figure 151 VPN Rules (IKE): Gateway Policy: Edit ..........................................................
319
Figure 152 VPN Rules (IKE): Network Policy Edit .............................................................
325
Figure 153 VPN Rules (IKE): Network Policy Move ...........................................................
329
Figure 154 VPN Rules (Manual) ........................................................................................
330
Figure 155 VPN Rules (Manual): Edit ................................................................................
332
Figure 156 VPN: SA Monitor ...............................................................................................
335
Figure 157 VPN: Global Setting ..........................................................................................
336
Figure 158 Telecommuters Sharing One VPN Rule Example .............................................
338
Figure 159 Telecommuters Using Unique VPN Rules Example .........................................
339
Figure 160 Certificate Configuration Overview ...................................................................
343
Figure 161 My Certificates .................................................................................................
344
Figure 162 My Certificate Import .........................................................................................
347
Figure 163 My Certificate Create ........................................................................................
348
Figure 164 My Certificate Details ........................................................................................
351
Figure 165 Trusted CAs ......................................................................................................
354
Figure 166 Trusted CA Import .............................................................................................
355
Figure 167 Trusted CA Details ............................................................................................
357
35
List of Figures