List of Tables

Table 82 Network > HTTP Redirect > Edit ...........................................................................................

263

Table 83 Network > ALG ......................................................................................................................

270

Table 84 Default Firewall Rules ...........................................................................................................

279

Table 85 Blocking All LAN to WAN IRC Traffic Example .....................................................................

281

Table 86 Limited LAN to WAN IRC Traffic Example 1 .........................................................................

282

Table 87 Limited LAN to WAN IRC Traffic Example 2 .........................................................................

282

Table 88 Firewall ..................................................................................................................................

284

Table 89 Firewall > Edit .......................................................................................................................

286

Table 90 VPN > IPSec VPN > VPN Connection ..................................................................................

298

Table 91 VPN > IPSec VPN > VPN Connection > Edit ........................................................................

299

Table 92 VPN > IPSec VPN > VPN Connection > Manual Key > Edit ................................................

303

Table 93 VPN Example: Matching ID Type and Content .....................................................................

310

Table 94 VPN Example: Mismatching ID Type and Content ...............................................................

310

Table 95 VPN > IPSec VPN > VPN Gateway ......................................................................................

312

Table 96 VPN > IPSec VPN > VPN Gateway > Edit ............................................................................

314

Table 97 VPN > IPSec VPN > Concentrator ........................................................................................

319

Table 98 VPN > IPSec VPN > Concentrator > Edit .............................................................................

320

Table 99 VPN > IPSec VPN > SA Monitor ...........................................................................................

321

Table 100 Objects ................................................................................................................................

323

Table 101 VPN > SSL VPN > Access Privilege ...................................................................................

324

Table 102 VPN > SSL VPN > Access Privilege > Add/Edit .................................................................

325

Table 103 VPN > SSL VPN > Connection Monitor ..............................................................................

327

Table 104 VPN > SSL VPN > Global Setting .......................................................................................

328

Table 105 Remote User Screen Overview ..........................................................................................

334

Table 106 VPN > IPSec VPN > VPN Connection ................................................................................

347

Table 107 VPN > L2TP VPN > Session Monitor ..................................................................................

348

Table 108 Configured Rate Effect ........................................................................................................

383

Table 109 Priority Effect .......................................................................................................................

383

Table 110 Maximize Bandwidth Usage Effect ......................................................................................

383

Table 111 Priority and Over Allotment of Bandwidth Effect ..................................................................

384

Table 112 AppPatrol > General ............................................................................................................

389

Table 113 AppPatrol > Common ..........................................................................................................

390

Table 114 Application Edit ...................................................................................................................

391

Table 115 Application Policy Edit .........................................................................................................

393

Table 116 AppPatrol > Other ...............................................................................................................

396

Table 117 AppPatrol > Other > Edit .....................................................................................................

397

Table 118 AppPatrol > Statistics: General Setup .................................................................................

400

Table 119 AppPatrol > Statistics: Protocol Statistics ............................................................................

401

Table 120 Common Computer Virus Types .........................................................................................

403

Table 121 Anti-X > Anti-Virus > General ..............................................................................................

407

Table 122 Anti-X > Anti-Virus > General > Edit ...................................................................................

408

Table 123 Anti-X > Anti-Virus > Setting ................................................................................................

411

Table 124 Anti-X > Anti-Virus > Setting > White List Add ...................................................................

412

ZyWALL USG 1000 User’s Guide

45