ZyWALL 5/35/70 Series User’s Guide
Table 82 Common Computer Virus Types .........................................................................
254
Table 83 Anti-Virus: General ..............................................................................................
258
Table 84 Anti-Virus: Update ...............................................................................................
260
Table 85 Anti-Spam: General .............................................................................................
267
Table 86 Anti-Spam: External DB .......................................................................................
268
Table 87 Anti-Spam: Lists ...................................................................................................
270
Table 88 Anti-Spam Rule Edit ............................................................................................
272
Table 89 Content Filter : General .......................................................................................
275
Table 90 Content Filter: Categories ....................................................................................
278
Table 91 Content Filter: Customization ..............................................................................
285
Table 92 Content Filter: Cache ...........................................................................................
288
Table 93 VPN and NAT ......................................................................................................
302
Table 94 ESP and AH ........................................................................................................
305
Table 95 Local ID Type and Content Fields .......................................................................
308
Table 96 Peer ID Type and Content Fields ........................................................................
Table 97 Matching ID Type and Content Configuration Example .......................................
Table 98 Mismatching ID Type and Content Configuration Example .................................
309
Table 99 IPSec Fields Summary ........................................................................................
312
Table 100 VPN screen Icons Key .......................................................................................
313
Table 101 VPN Rules (IKE): Gateway Policy: Edit .............................................................
316
Table 102 VPN Rules (IKE): Network Policy Edit ...............................................................
322
Table 103 VPN Rules (IKE): Network Policy Move ............................................................
325
Table 104 VPN Rules (Manual) ..........................................................................................
326
Table 105 VPN Rules (Manual) Edit ...................................................................................
328
Table 106 VPN: SA Monitor ...............................................................................................
331
Table 107 VPN: Global Setting ...........................................................................................
332
Table 108 Telecommuters Sharing One VPN Rule Example .............................................
334
Table 109 Telecommuters Using Unique VPN Rules Example ..........................................
335
Table 110 My Certificates ...................................................................................................
340
Table 111 My Certificate Import ..........................................................................................
343
Table 112 My Certificate Create .........................................................................................
344
Table 113 My Certificate Details .........................................................................................
348
Table 114 Trusted CAs .......................................................................................................
350
Table 115 Trusted CA Import ..............................................................................................
352
Table 116 Trusted CA Details .............................................................................................
353
Table 117 Trusted Remote Hosts .......................................................................................
356
Table 118 Trusted Remote Host Import ..............................................................................
359
Table 119 Trusted Remote Host Details .............................................................................
360
Table 120 Directory Servers ...............................................................................................
363
Table 121 Directory Server Add .........................................................................................
364
Table 122 Local User Database .........................................................................................
368
Table 123 RADIUS .............................................................................................................
369
Table 124 NAT Definitions ..................................................................................................
370
List of Tables
42