ZyWALL 5/35/70 Series User’s Guide

Table 82 Common Computer Virus Types .........................................................................

254

Table 83 Anti-Virus: General ..............................................................................................

258

Table 84 Anti-Virus: Update ...............................................................................................

260

Table 85 Anti-Spam: General .............................................................................................

267

Table 86 Anti-Spam: External DB .......................................................................................

268

Table 87 Anti-Spam: Lists ...................................................................................................

270

Table 88 Anti-Spam Rule Edit ............................................................................................

272

Table 89 Content Filter : General .......................................................................................

275

Table 90 Content Filter: Categories ....................................................................................

278

Table 91 Content Filter: Customization ..............................................................................

285

Table 92 Content Filter: Cache ...........................................................................................

288

Table 93 VPN and NAT ......................................................................................................

302

Table 94 ESP and AH ........................................................................................................

305

Table 95 Local ID Type and Content Fields .......................................................................

308

Table 96 Peer ID Type and Content Fields ........................................................................

308

Table 97 Matching ID Type and Content Configuration Example .......................................

308

Table 98 Mismatching ID Type and Content Configuration Example .................................

309

Table 99 IPSec Fields Summary ........................................................................................

312

Table 100 VPN screen Icons Key .......................................................................................

313

Table 101 VPN Rules (IKE): Gateway Policy: Edit .............................................................

316

Table 102 VPN Rules (IKE): Network Policy Edit ...............................................................

322

Table 103 VPN Rules (IKE): Network Policy Move ............................................................

325

Table 104 VPN Rules (Manual) ..........................................................................................

326

Table 105 VPN Rules (Manual) Edit ...................................................................................

328

Table 106 VPN: SA Monitor ...............................................................................................

331

Table 107 VPN: Global Setting ...........................................................................................

332

Table 108 Telecommuters Sharing One VPN Rule Example .............................................

334

Table 109 Telecommuters Using Unique VPN Rules Example ..........................................

335

Table 110 My Certificates ...................................................................................................

340

Table 111 My Certificate Import ..........................................................................................

343

Table 112 My Certificate Create .........................................................................................

344

Table 113 My Certificate Details .........................................................................................

348

Table 114 Trusted CAs .......................................................................................................

350

Table 115 Trusted CA Import ..............................................................................................

352

Table 116 Trusted CA Details .............................................................................................

353

Table 117 Trusted Remote Hosts .......................................................................................

356

Table 118 Trusted Remote Host Import ..............................................................................

359

Table 119 Trusted Remote Host Details .............................................................................

360

Table 120 Directory Servers ...............................................................................................

363

Table 121 Directory Server Add .........................................................................................

364

Table 122 Local User Database .........................................................................................

368

Table 123 RADIUS .............................................................................................................

369

Table 124 NAT Definitions ..................................................................................................

370

List of Tables

42