ZyXEL Communications 2WG Network Card User Manual


 
List of Figures
ZyWALL 2WG User’s Guide
33
Figure 168 My Service Firewall Rule Example: Rule Edit: Source and Destination Addresses .......... 268
Figure 169 My Service Firewall Rule Example: Edit Rule: Service Configuration ................................ 269
Figure 170 My Service Firewall Rule Example: Rule Summary: Completed ........................................ 270
Figure 171 Content Filtering Lookup Procedure ................................................................................... 272
Figure 172 SECURITY > CONTENT FILTER > General ...................................................................... 273
Figure 173 SECURITY > CONTENT FILTER > Policy ......................................................................... 276
Figure 174 SECURITY > CONTENT FILTER > Policy > General ........................................................ 277
Figure 175 SECURITY > CONTENT FILTER > Policy > External Database ....................................... 279
Figure 176 SECURITY > CONTENT FILTER > Policy > Customization .............................................. 286
Figure 177 SECURITY > CONTENT FILTER > Policy > Schedule ...................................................... 288
Figure 178 SECURITY > CONTENT FILTER > Object ........................................................................ 289
Figure 179 SECURITY > CONTENT FILTER > Cache ........................................................................ 292
Figure 180 myZyXEL.com: Login ......................................................................................................... 294
Figure 181 myZyXEL.com: Welcome ................................................................................................... 294
Figure 182 myZyXEL.com: Service Management ................................................................................ 295
Figure 183 Blue Coat: Login ................................................................................................................. 295
Figure 184 Content Filtering Reports Main Screen .............................................................................. 296
Figure 185 Blue Coat: Report Home .................................................................................................... 296
Figure 186 Global Report Screen Example .......................................................................................... 297
Figure 187 Requested URLs Example ................................................................................................. 298
Figure 188 Web Page Review Process Screen ................................................................................... 299
Figure 189 VPN: Example .................................................................................................................... 301
Figure 190 VPN: IKE SA and IPSec SA .............................................................................................. 302
Figure 191 Gateway and Network Policies .......................................................................................... 303
Figure 192 IPSec Fields Summary ..................................................................................................... 303
Figure 193 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 304
Figure 194 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ......................................... 305
Figure 195 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ...................................... 306
Figure 196 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 306
Figure 197 VPN/NAT Example ............................................................................................................. 309
Figure 198 IPSec High Availability ........................................................................................................311
Figure 199 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 313
Figure 200 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 319
Figure 201 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 320
Figure 202 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 322
Figure 203 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 327
Figure 204 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 328
Figure 205 VPN Rule Configured ......................................................................................................... 329
Figure 206 VPN Dial ............................................................................................................................. 329
Figure 207 VPN Tunnel Established ..................................................................................................... 330
Figure 208 VPN Log Example ............................................................................................................. 331
Figure 209 IKE/IPSec Debug Example ............................................................................................... 332
Figure 210 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 334