EasyManua.ls Logo

ZyXEL Communications 5 Series - Page 30

ZyXEL Communications 5 Series
824 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
ZyWALL 5/35/70 Series User’s Guide
30
Figure 39 VPN Wizard Setup Complete ............................................................................................... 104
Figure 40 Anti-Spam Wizard: Email Server Location Setting .............................................................. 105
Figure 41 Anti-Spam Wizard: Direction Recommendations ................................................................. 106
Figure 42 Anti-Spam Wizard: Direction Configuration .......................................................................... 107
Figure 43 Anti-Spam Wizard: Setup Complete .....................................................................................108
Figure 44 Dynamic VPN Rule Example ................................................................................................ 109
Figure 45 VPN Gateway Policy Edit Screens ........................................................................................112
Figure 46 SECURITY > VPN > Add Network Policy (ZyWALL A) .........................................................113
Figure 47 VPN Network Policy Edit Screens .........................................................................................114
Figure 48 Activate VPN Rule (ZyWALL B) ...........................................................................................115
Figure 49 Tutorial: VPN Summary Screens Comparison Example .......................................................116
Figure 50 Check The Telecommuter's Computer IP Address ...............................................................117
Figure 51 Telecommuter Pinging a Network X IP Address Example .....................................................118
Figure 52 Additional Dynamic VPN Rules Example ..............................................................................119
Figure 53 IDP for From VPN Traffic ...................................................................................................... 120
Figure 54 IDP Configuration for Traffic From VPN ...............................................................................121
Figure 55 IDP for To VPN Traffic .......................................................................................................... 121
Figure 56 IDP Configuration for To VPN Traffic .................................................................................... 122
Figure 57 Firewall Rule for VPN ........................................................................................................... 123
Figure 58 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 123
Figure 59 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy ........................................... 124
Figure 60 SECURITY > VPN > VPN Rules (IKE): With Gateway Policy Example ............................... 125
Figure 61 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy ............................................. 126
Figure 62 SECURITY > FIREWALL > Rule Summary ......................................................................... 127
Figure 63 SECURITY > FIREWALL > Rule Summary > Edit: Allow ................................................... 128
Figure 64 SECURITY > FIREWALL > Rule Summary: Allow ............................................................... 129
Figure 65 SECURITY > FIREWALL > Default Rule: Block From VPN To LAN .................................... 130
Figure 66 Tutorial: NETWORK > WAN > 3G (WAN2) ....................................................................... 131
Figure 67 Tutorial: Home ..................................................................................................................... 132
Figure 68 Tutorial: NETWORK > WAN > General ............................................................................. 133
Figure 69 SECURITY > CONTENT FILTER > General ........................................................................ 134
Figure 70 SECURITY > CONTENT FILTER > Policy ........................................................................... 135
Figure 71 SECURITY > CONTENT FILTER > Policy > External Database (Default) .......................... 135
Figure 72 HOME > Show DHCP Table ................................................................................................. 136
Figure 73 SECURITY > CONTENT FILTER > Policy ........................................................................... 136
Figure 74 SECURITY > CONTENT FILTER > Policy > Insert .............................................................. 137
Figure 75 SECURITY > CONTENT FILTER > Policy ........................................................................... 137
Figure 76 SECURITY > CONTENT FILTER > Policy > Schedule (Bob) .............................................. 138
Figure 77 SECURITY > CONTENT FILTER > Policy ........................................................................... 138
Figure 78 SECURITY > CONTENT FILTER > Policy > External Database (Bob) ............................... 139
Figure 79 REGISTRATION > Registration ........................................................................................... 143
Figure 80 REGISTRATION > Registration: Registered Device ............................................................ 144
Figure 81 REGISTRATION > Service ................................................................................................... 145

Table of Contents

Related product manuals