beautypg.com

ZyXEL Communications ZyWALL 2 Plus User Manual

Page 40

background image

List of Tables

ZyWALL 2 Plus User’s Guide

40

Table 39 NETWORK > DMZ > Static DHCP ........................................................................................ 175
Table 40 NETWORK > DMZ > IP Alias ............................................................................................... 176
Table 41 NETWORK > DMZ > Port Roles ........................................................................................... 179
Table 42 NETWORK > WLAN ............................................................................................................. 182
Table 43 NETWORK > WLAN > Static DHCP ..................................................................................... 185
Table 44 NETWORK > WLAN > IP Alias ............................................................................................. 186
Table 45 NETWORK > WLAN > Port Roles ........................................................................................ 188
Table 46 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 200
Table 47 Limited LAN to WAN IRC Traffic Example ............................................................................ 201
Table 48 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 203
Table 49 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 205
Table 50 SECURITY > FIREWALL > Rule Summary .......................................................................... 207
Table 51 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 210
Table 52 SECURITY > FIREWALL > Anti-Probing .............................................................................. 212
Table 53 SECURITY > FIREWALL > Threshold .................................................................................. 214
Table 54 SECURITY > FIREWALL > Service ...................................................................................... 215
Table 55 SECURITY > FIREWALL > Service > Add ........................................................................... 216
Table 56 SECURITY > CONTENT FILTER > General ........................................................................ 225
Table 57 SECURITY > CONTENT FILTER > Policy ........................................................................... 228
Table 58 SECURITY > CONTENT FILTER > Policy > General ........................................................... 229
Table 59 SECURITY > CONTENT FILTER > Policy > External Database .......................................... 231
Table 60 SECURITY > CONTENT FILTER > Policy > Customization ................................................. 238
Table 61 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................ 240
Table 62 SECURITY > CONTENT FILTER > Object ........................................................................... 241
Table 63 SECURITY > CONTENT FILTER > Cache ........................................................................... 244
Table 64 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 256
Table 65 VPN Example: Matching ID Type and Content ..................................................................... 259
Table 66 VPN Example: Mismatching ID Type and Content ............................................................... 259
Table 67 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................................. 266
Table 68 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy .............................................. 275
Table 69 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ................. 279
Table 70 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................ 280
Table 71 SECURITY > VPN > VPN Rules (Manual) ........................................................................... 282
Table 72 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................................. 283
Table 73 SECURITY > VPN > SA Monitor .......................................................................................... 286
Table 74 SECURITY > VPN > Global Setting ...................................................................................... 288
Table 75 Telecommuters Sharing One VPN Rule Example ................................................................. 290
Table 76 Telecommuters Using Unique VPN Rules Example ............................................................. 291
Table 77 SECURITY > CERTIFICATES > My Certificates .................................................................. 298
Table 78 SECURITY > CERTIFICATES > My Certificates > Details ................................................... 300
Table 79 SECURITY > CERTIFICATES > My Certificates > Export .................................................... 303
Table 80 SECURITY > CERTIFICATES > My Certificates > Import .................................................... 304
Table 81 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 .................................. 305