ZyXEL Communications ZyXEL ZyWALL 2WG User Manual
Page 16
Table of Contents
ZyWALL 2WG User’s Guide
16
12.3 Content Filtering with an External Database ................................................................... 234
12.4 Content Filter Categories .............................................................................................. 234
12.5 Content Filter Customization ........................................................................................ 243
12.6 Customizing Keyword Blocking URL Checking ............................................................... 245
13.1 Checking Content Filtering Activation .............................................................................. 249
13.2 Viewing Content Filtering Reports ................................................................................... 249
13.3 Web Site Submission ....................................................................................................... 254
14.2 VPN Rules (IKE) .............................................................................................................. 259
14.3 IKE SA Setup .................................................................................................................. 261
14.4.1 SA Life Time ........................................................................................................... 265
14.4.2 IPSec High Availability ........................................................................................... 266
14.4.3 Encryption and Authentication Algorithms ............................................................. 267
14.5 VPN Rules (IKE) Gateway Policy Edit ............................................................................. 267
14.6 IPSec SA Overview ..................................................................................................... 273
14.6.1 Local Network and Remote Network ...................................................................... 273
14.6.2 Active Protocol ....................................................................................................... 273
14.6.3 Encapsulation ......................................................................................................... 274
14.6.4 IPSec SA Proposal and Perfect Forward Secrecy ................................................. 274
14.7 VPN Rules (IKE): Network Policy Edit ............................................................................ 275
14.8 VPN Rules (IKE): Network Policy Move ........................................................................ 279
14.9 Dialing the VPN Tunnel via Web Configurator ................................................................. 280
14.10 VPN Troubleshooting ..................................................................................................... 281
14.11 IPSec Debug .................................................................................................................. 283
14.12 IPSec SA Using Manual Keys ................................................................................... 284
14.13 VPN Rules (Manual) ...................................................................................................... 284
14.14 VPN Rules (Manual): Edit ........................................................................................... 286