beautypg.com

ZyXEL Communications ZyXEL ZyWALL 2WG User Manual

Page 16

background image

Table of Contents

ZyWALL 2WG User’s Guide

16

12.3 Content Filtering with an External Database ................................................................... 234
12.4 Content Filter Categories .............................................................................................. 234
12.5 Content Filter Customization ........................................................................................ 243
12.6 Customizing Keyword Blocking URL Checking ............................................................... 245

12.6.1 Domain Name or IP Address URL Checking ......................................................... 246
12.6.2 Full Path URL Checking ......................................................................................... 246
12.6.3 File Name URL Checking ....................................................................................... 246

12.7 Content Filtering Cache ................................................................................................. 246

Chapter 13
Content Filtering Reports..................................................................................................... 249

13.1 Checking Content Filtering Activation .............................................................................. 249
13.2 Viewing Content Filtering Reports ................................................................................... 249
13.3 Web Site Submission ....................................................................................................... 254

Chapter 14
IPSec VPN.............................................................................................................................. 257

14.1 IPSec VPN Overview ..................................................................................................... 257

14.1.1 IKE SA Overview .................................................................................................... 258

14.2 VPN Rules (IKE) .............................................................................................................. 259
14.3 IKE SA Setup .................................................................................................................. 261

14.3.1 IKE SA Proposal .................................................................................................... 261

14.4 Additional IPSec VPN Topics ........................................................................................... 265

14.4.1 SA Life Time ........................................................................................................... 265
14.4.2 IPSec High Availability ........................................................................................... 266
14.4.3 Encryption and Authentication Algorithms ............................................................. 267

14.5 VPN Rules (IKE) Gateway Policy Edit ............................................................................. 267
14.6 IPSec SA Overview ..................................................................................................... 273

14.6.1 Local Network and Remote Network ...................................................................... 273
14.6.2 Active Protocol ....................................................................................................... 273
14.6.3 Encapsulation ......................................................................................................... 274
14.6.4 IPSec SA Proposal and Perfect Forward Secrecy ................................................. 274

14.7 VPN Rules (IKE): Network Policy Edit ............................................................................ 275
14.8 VPN Rules (IKE): Network Policy Move ........................................................................ 279
14.9 Dialing the VPN Tunnel via Web Configurator ................................................................. 280
14.10 VPN Troubleshooting ..................................................................................................... 281

14.10.1 VPN Log ............................................................................................................... 282

14.11 IPSec Debug .................................................................................................................. 283
14.12 IPSec SA Using Manual Keys ................................................................................... 284

14.12.1 IPSec SA Proposal Using Manual Keys ............................................................... 284
14.12.2 Authentication and the Security Parameter Index (SPI) ....................................... 284

14.13 VPN Rules (Manual) ...................................................................................................... 284
14.14 VPN Rules (Manual): Edit ........................................................................................... 286