ZyWALL 2 Series User’s Guide

Table 10-2 ICMP Commands That Trigger Alerts .......................................................................................

10-6

Table 10-3 Legal NetBIOS Commands .......................................................................................................

10-7

Table 10-4 Legal SMTP Commands ............................................................................................................

10-7

Table 11-1 Firewall Rules Summary: First Screen........................................................................................

11-7

Table 11-2 Creating/Editing A Firewall Rule..............................................................................................

11-10

Table 11-3 Adding/Editing Source and Destination Addresses...................................................................

11-12

Table 11-4 Creating/Editing A Custom Port................................................................................................

11-13

Table 11-5 Predefined Services...................................................................................................................

11-18

Table 11-6 Attack Alert ...............................................................................................................................

11-23

Table 12-1 Content Filter : General..............................................................................................................

12-3

Table 12-2 Content Filter : Categories .........................................................................................................

12-7

Table 12-3 Content Filter : Customization .................................................................................................

12-16

Table 13-1 VPN and NAT ............................................................................................................................

13-5

Table 14-1 AH and ESP ...............................................................................................................................

14-2

Table 14-2 VPN Rules .................................................................................................................................

14-4

Table 14-3 Local ID Type and Content Fields .............................................................................................

14-8

Table 14-4 Peer ID Type and Content Fields ...............................................................................................

14-9

Table 14-5 Matching ID Type and Content Configuration Example............................................................

14-9

Table 14-6 Mismatching ID Type and Content Configuration Example......................................................

14-9

Table 14-7 Basic IKE VPN Rule Edit ........................................................................................................

14-13

Table 14-8 Advanced IKE VPN Rule Setup..................................................................................................

14-25

Table 14-9 VPN Manual Setup ..................................................................................................................

14-30

Table 14-10 VPN SA Monitor....................................................................................................................

14-34

Table 14-11 VPN Global Setting................................................................................................................

14-35

Table 14-12 Telecommuters Sharing One VPN Rule Example..................................................................

14-36

Table 14-13 Telecommuters Using Unique VPN Rules Example..............................................................

14-37

Table 15-1 My Certificates...........................................................................................................................

15-4

Table 15-2 My Certificate Import ................................................................................................................

15-6

Table 15-3 My Certificate Create.................................................................................................................

15-8

Table 15-4 My Certificate Details..............................................................................................................

15-12

Table 15-5 Trusted CAs .............................................................................................................................

15-15

Table 15-6 Trusted CA Import ...................................................................................................................

15-17

Table 15-7 Trusted CA Details...................................................................................................................

15-19

Table 15-8 Trusted Remote Hosts ..............................................................................................................

15-22

Table 15-9 Remote Host Certificates .........................................................................................................

15-24

Table 15-10 Certificate Details ..................................................................................................................

15-24

Table 15-11 Trusted Remote Host Import..................................................................................................

15-25

Table 15-12 Trusted Remote Host Details .................................................................................................

15-27

Table 15-13 Directory Servers ...................................................................................................................

15-29

Table 15-14 Directory Server Add .............................................................................................................

15-31

Table 16-1 Local User Database ..................................................................................................................

16-3

List of Tables

xxiii