beautypg.com

ZyXEL Communications 5 Series User Manual

Page 47

background image

ZyWALL 5/35/70 Series User’s Guide

List of Tables

47

Table 82 SECURITY > ANTI-VIRUS > General ................................................................. 275

Table 83 SECURITY > ANTI-VIRUS > Signature: Query View .......................................... 277

Table 84 SECURITY > ANTI-SPAM > General .................................................................. 290

Table 85 SECURITY > ANTI-SPAM > External DB ............................................................ 293

Table 86 SECURITY > ANTI-SPAM > Lists ........................................................................ 295

Table 87 SECURITY > ANTI-SPAM > Lists > Edit ............................................................. 297

Table 88 SECURITY > CONTENT FILTER > General ....................................................... 300

Table 89 SECURITY > CONTENT FILTER > Categories .................................................. 304

Table 90 SECURITY > CONTENT FILTER > Customization ............................................. 311

Table 91 SECURITY > CONTENT FILTER > Cache ......................................................... 314

Table 92 SECURITY > VPN > VPN Rules (IKE) ................................................................ 326

Table 93 VPN Example: Matching ID Type and Content .................................................... 329

Table 94 VPN Example: Mismatching ID Type and Content .............................................. 329

Table 95 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................ 336

Table 96 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ............................. 344

Table 97 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy .......................... 347

Table 98 SECURITY > VPN > VPN Rules (Manual) .......................................................... 349

Table 99 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................ 351

Table 100 SECURITY > VPN > SA Monitor ....................................................................... 353

Table 101 SECURITY > VPN > Global Setting .................................................................. 354

Table 102 Telecommuters Sharing One VPN Rule Example ............................................. 356

Table 103 Telecommuters Using Unique VPN Rules Example .......................................... 357

Table 104 SECURITY > CERTIFICATES > My Certificates ............................................... 366

Table 105 SECURITY > CERTIFICATES > My Certificates > Details ................................ 369

Table 106 SECURITY > CERTIFICATES > My Certificates > Export ................................ 371

Table 107 SECURITY > CERTIFICATES > My Certificates > Import ................................ 373

Table 108 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............... 374

Table 109 SECURITY > CERTIFICATES > My Certificates > Create ................................ 375

Table 110 SECURITY > CERTIFICATES > Trusted CAs ................................................... 377

Table 111 SECURITY > CERTIFICATES > Trusted CAs > Details .................................... 379

Table 112 SECURITY > CERTIFICATES > Trusted CAs Import ........................................ 382

Table 113 SECURITY > CERTIFICATES > Trusted Remote Hosts ................................... 383

Table 114 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................... 385

Table 115 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details .................... 386

Table 116 SECURITY > CERTIFICATES > Directory Servers ........................................... 389

Table 117 SECURITY > CERTIFICATES > Directory Server > Add .................................. 390

Table 118 SECURITY > AUTH SERVER > Local User Database ..................................... 393

Table 119 SECURITY > AUTH SERVER > RADIUS ......................................................... 394

Table 120 NAT Definitions .................................................................................................. 395

Table 121 NAT Mapping Types .......................................................................................... 399

Table 122 ADVANCED > NAT > NAT Overview ................................................................. 400

Table 123 ADVANCED > NAT > Address Mapping ............................................................ 402

Table 124 ADVANCED > NAT > Address Mapping > Edit ................................................. 404