ZyWALL 5/35/70 Series User’s Guide

Figure 125 Anti-Spam: General ...........................................................................................

266

Figure 126 Anti-Spam: External DB ....................................................................................

268

Figure 127 Anti-Spam: Lists ................................................................................................

270

Figure 128 Anti-Spam Rule Edit .........................................................................................

271

Figure 129 Content Filter : General .....................................................................................

275

Figure 130 Content Filtering Lookup Procedure .................................................................

277

Figure 131 Content Filter : Categories ................................................................................

278

Figure 132 Content Filter: Customization ............................................................................

284

Figure 133 Content Filter: Cache ........................................................................................

287

Figure 134 myZyXEL.com: Login ........................................................................................

291

Figure 135 myZyXEL.com: Welcome ..................................................................................

291

Figure 136 myZyXEL.com: Service Management ...............................................................

292

Figure 137 Blue Coat: Login ...............................................................................................

292

Figure 138 Content Filtering Reports Main Screen .............................................................

293

Figure 139 Blue Coat: Report Home ...................................................................................

293

Figure 140 Global Report Screen Example ........................................................................

294

Figure 141 Requested URLs Example ................................................................................

295

Figure 142 Web Page Review Process Screen ..................................................................

296

Figure 143 Encryption and Decryption ................................................................................

299

Figure 144 IPSec Architecture ............................................................................................

300

Figure 145 Transport and Tunnel Mode IPSec Encapsulation ............................................

301

Figure 146 NAT Router Between IPSec Routers ................................................................

307

Figure 147 Two Phases to Set Up the IPSec SA ................................................................

309

Figure 148 VPN Rules (IKE) ...............................................................................................

312

Figure 149 Gateway and Network Policies ........................................................................

313

Figure 150 IPSec Fields Summary ...................................................................................

313

Figure 151 VPN Rules (IKE): Gateway Policy: Edit ..........................................................

315

Figure 152 VPN Rules (IKE): Network Policy Edit .............................................................

321

Figure 153 VPN Rules (IKE): Network Policy Move ...........................................................

325

Figure 154 VPN Rules (Manual) ........................................................................................

326

Figure 155 VPN Rules (Manual): Edit ................................................................................

328

Figure 156 VPN: SA Monitor ...............................................................................................

331

Figure 157 VPN: Global Setting ..........................................................................................

332

Figure 158 Telecommuters Sharing One VPN Rule Example .............................................

334

Figure 159 Telecommuters Using Unique VPN Rules Example .........................................

335

Figure 160 Certificate Configuration Overview ...................................................................

339

Figure 161 My Certificates .................................................................................................

340

Figure 162 My Certificate Import .........................................................................................

343

Figure 163 My Certificate Create ........................................................................................

344

Figure 164 My Certificate Details ........................................................................................

347

Figure 165 Trusted CAs ......................................................................................................

350

Figure 166 Trusted CA Import .............................................................................................

351

Figure 167 Trusted CA Details ............................................................................................

353

31

List of Figures