List of Tables
Table 82 Network > HTTP Redirect > Edit ...........................................................................................
263
Table 83 Network > ALG ......................................................................................................................
270
Table 84 Default Firewall Rules ...........................................................................................................
279
Table 85 Blocking All LAN to WAN IRC Traffic Example .....................................................................
281
Table 86 Limited LAN to WAN IRC Traffic Example 1 .........................................................................
282
Table 87 Limited LAN to WAN IRC Traffic Example 2 .........................................................................
Table 88 Firewall ..................................................................................................................................
284
Table 89 Firewall > Edit .......................................................................................................................
287
Table 90 VPN > IPSec VPN > VPN Connection ..................................................................................
298
Table 91 VPN > IPSec VPN > VPN Connection > Edit ........................................................................
299
Table 92 VPN > IPSec VPN > VPN Connection > Manual Key > Edit ................................................
303
Table 93 VPN Example: Matching ID Type and Content .....................................................................
310
Table 94 VPN Example: Mismatching ID Type and Content ...............................................................
Table 95 VPN > IPSec VPN > VPN Gateway ......................................................................................
312
Table 96 VPN > IPSec VPN > VPN Gateway > Edit ............................................................................
314
Table 97 VPN > IPSec VPN > Concentrator ........................................................................................
319
Table 98 VPN > IPSec VPN > Concentrator > Edit .............................................................................
320
Table 99 VPN > IPSec VPN > SA Monitor ...........................................................................................
321
Table 100 Objects ................................................................................................................................
323
Table 101 VPN > SSL VPN > Access Privilege ...................................................................................
324
Table 102 VPN > SSL VPN > Access Privilege > Add/Edit .................................................................
325
Table 103 VPN > SSL VPN > Connection Monitor ..............................................................................
327
Table 104 VPN > SSL VPN > Global Setting .......................................................................................
328
Table 105 Remote User Screen Overview ..........................................................................................
334
Table 106 VPN > IPSec VPN > VPN Connection ................................................................................
347
Table 107 VPN > L2TP VPN > Session Monitor ..................................................................................
348
Table 108 Configured Rate Effect ........................................................................................................
383
Table 109 Priority Effect .......................................................................................................................
Table 110 Maximize Bandwidth Usage Effect ......................................................................................
Table 111 Priority and Over Allotment of Bandwidth Effect ..................................................................
384
Table 112 AppPatrol > General ............................................................................................................
389
Table 113 AppPatrol > Common ..........................................................................................................
390
Table 114 Application Edit ...................................................................................................................
391
Table 115 Application Policy Edit .........................................................................................................
393
Table 116 AppPatrol > Other ...............................................................................................................
396
Table 117 AppPatrol > Other > Edit .....................................................................................................
397
Table 118 AppPatrol > Statistics: General Setup .................................................................................
400
Table 119 AppPatrol > Statistics: Protocol Statistics ............................................................................
401
Table 120 Common Computer Virus Types .........................................................................................
403
Table 121 Anti-X > Anti-Virus > General ..............................................................................................
407
Table 122 Anti-X > Anti-Virus > General > Edit ...................................................................................
408
Table 123 Anti-X > Anti-Virus > Setting ................................................................................................
411
Table 124 Anti-X > Anti-Virus > Setting > White List Add ...................................................................
412
ZyWALL USG 300 User’s Guide
45