ZyWALL 5/35/70 Series User’s Guide
Figure 125 Anti-Spam: General ...........................................................................................
266
Figure 126 Anti-Spam: External DB ....................................................................................
268
Figure 127 Anti-Spam: Lists ................................................................................................
270
Figure 128 Anti-Spam Rule Edit .........................................................................................
271
Figure 129 Content Filter : General .....................................................................................
275
Figure 130 Content Filtering Lookup Procedure .................................................................
277
Figure 131 Content Filter : Categories ................................................................................
278
Figure 132 Content Filter: Customization ............................................................................
284
Figure 133 Content Filter: Cache ........................................................................................
287
Figure 134 myZyXEL.com: Login ........................................................................................
291
Figure 135 myZyXEL.com: Welcome ..................................................................................
Figure 136 myZyXEL.com: Service Management ...............................................................
292
Figure 137 Blue Coat: Login ...............................................................................................
Figure 138 Content Filtering Reports Main Screen .............................................................
293
Figure 139 Blue Coat: Report Home ...................................................................................
Figure 140 Global Report Screen Example ........................................................................
294
Figure 141 Requested URLs Example ................................................................................
295
Figure 142 Web Page Review Process Screen ..................................................................
296
Figure 143 Encryption and Decryption ................................................................................
299
Figure 144 IPSec Architecture ............................................................................................
300
Figure 145 Transport and Tunnel Mode IPSec Encapsulation ............................................
301
Figure 146 NAT Router Between IPSec Routers ................................................................
307
Figure 147 Two Phases to Set Up the IPSec SA ................................................................
309
Figure 148 VPN Rules (IKE) ...............................................................................................
312
Figure 149 Gateway and Network Policies ........................................................................
313
Figure 150 IPSec Fields Summary ...................................................................................
Figure 151 VPN Rules (IKE): Gateway Policy: Edit ..........................................................
315
Figure 152 VPN Rules (IKE): Network Policy Edit .............................................................
321
Figure 153 VPN Rules (IKE): Network Policy Move ...........................................................
325
Figure 154 VPN Rules (Manual) ........................................................................................
326
Figure 155 VPN Rules (Manual): Edit ................................................................................
328
Figure 156 VPN: SA Monitor ...............................................................................................
331
Figure 157 VPN: Global Setting ..........................................................................................
332
Figure 158 Telecommuters Sharing One VPN Rule Example .............................................
334
Figure 159 Telecommuters Using Unique VPN Rules Example .........................................
335
Figure 160 Certificate Configuration Overview ...................................................................
339
Figure 161 My Certificates .................................................................................................
340
Figure 162 My Certificate Import .........................................................................................
343
Figure 163 My Certificate Create ........................................................................................
344
Figure 164 My Certificate Details ........................................................................................
347
Figure 165 Trusted CAs ......................................................................................................
350
Figure 166 Trusted CA Import .............................................................................................
351
Figure 167 Trusted CA Details ............................................................................................
353
31
List of Figures