ZyXEL Communications 70 Series User Manual
Page 35

ZyWALL 5/35/70 Series User’s Guide
35
List of Figures
Figure 125 Anti-Spam: General ........................................................................................... 270
Figure 126 Anti-Spam: External DB .................................................................................... 272
Figure 127 Anti-Spam: Lists ................................................................................................ 274
Figure 128 Anti-Spam Rule Edit ......................................................................................... 275
Figure 129 Content Filter : General ..................................................................................... 279
Figure 130 Content Filtering Lookup Procedure ................................................................. 281
Figure 131 Content Filter : Categories ................................................................................ 282
Figure 132 Content Filter: Customization ............................................................................ 288
Figure 133 Content Filter: Cache ........................................................................................ 291
Figure 134 myZyXEL.com: Login ........................................................................................ 295
Figure 135 myZyXEL.com: Welcome .................................................................................. 295
Figure 136 myZyXEL.com: Service Management ............................................................... 296
Figure 137 Blue Coat: Login ............................................................................................... 296
Figure 138 Content Filtering Reports Main Screen ............................................................. 297
Figure 139 Blue Coat: Report Home ................................................................................... 297
Figure 140 Global Report Screen Example ........................................................................ 298
Figure 141 Requested URLs Example ................................................................................ 299
Figure 142 Web Page Review Process Screen .................................................................. 300
Figure 143 Encryption and Decryption ................................................................................ 303
Figure 144 IPSec Architecture ............................................................................................ 304
Figure 145 Transport and Tunnel Mode IPSec Encapsulation ............................................ 305
Figure 146 NAT Router Between IPSec Routers ................................................................ 311
Figure 147 Two Phases to Set Up the IPSec SA ................................................................ 313
Figure 148 VPN Rules (IKE) ............................................................................................... 316
Figure 149 Gateway and Network Policies ........................................................................ 317
Figure 150 IPSec Fields Summary ................................................................................... 317
Figure 151 VPN Rules (IKE): Gateway Policy: Edit .......................................................... 319
Figure 152 VPN Rules (IKE): Network Policy Edit ............................................................. 325
Figure 153 VPN Rules (IKE): Network Policy Move ........................................................... 329
Figure 154 VPN Rules (Manual) ........................................................................................ 330
Figure 155 VPN Rules (Manual): Edit ................................................................................ 332
Figure 156 VPN: SA Monitor ............................................................................................... 335
Figure 157 VPN: Global Setting .......................................................................................... 336
Figure 158 Telecommuters Sharing One VPN Rule Example ............................................. 338
Figure 159 Telecommuters Using Unique VPN Rules Example ......................................... 339
Figure 160 Certificate Configuration Overview ................................................................... 343
Figure 161 My Certificates ................................................................................................. 344
Figure 162 My Certificate Import ......................................................................................... 347
Figure 163 My Certificate Create ........................................................................................ 348
Figure 164 My Certificate Details ........................................................................................ 351
Figure 165 Trusted CAs ...................................................................................................... 354
Figure 166 Trusted CA Import ............................................................................................. 355
Figure 167 Trusted CA Details ............................................................................................ 357