List of Tables
ZyWALL 2 Plus User’s Guide
38
Table 39 NETWORK > DMZ ................................................................................................................ 162
Table 40 NETWORK > DMZ > Static DHCP ........................................................................................ 165
Table 41 NETWORK > DMZ > IP Alias ............................................................................................... 166
Table 42 NETWORK > DMZ > Port Roles ...........................................................................................169
Table 43 NETWORK > WLAN ............................................................................................................. 172
Table 44 NETWORK > WLAN > Static DHCP ..................................................................................... 175
Table 45 NETWORK > WLAN > IP Alias ............................................................................................. 176
Table 46 NETWORK > WLAN > Port Roles ........................................................................................ 178
Table 47 .............................................................................................................................................. 182
Table 48 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 189
Table 49 Limited LAN to WAN IRC Traffic Example ............................................................................ 189
Table 50 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 192
Table 51 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 194
Table 52 SECURITY > FIREWALL > Rule Summary .......................................................................... 195
Table 53 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 198
Table 54 SECURITY > FIREWALL > Anti-Probing .............................................................................. 200
Table 55 SECURITY > FIREWALL > Threshold .................................................................................. 202
Table 56 SECURITY > FIREWALL > Service ...................................................................................... 203
Table 57 SECURITY > FIREWALL > Service > Add ........................................................................... 204
Table 58 SECURITY > CONTENT FILTER > General ........................................................................ 212
Table 59 SECURITY > CONTENT FILTER > Categories .................................................................... 216
Table 60 SECURITY > CONTENT FILTER > Customization .............................................................. 222
Table 61 SECURITY > CONTENT FILTER > Cache ........................................................................... 225
Table 62 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 238
Table 63 VPN Example: Matching ID Type and Content ..................................................................... 241
Table 64 VPN Example: Mismatching ID Type and Content ............................................................... 241
Table 65 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................................. 247
Table 66 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy .............................................. 256
Table 67 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ................. 260
Table 68 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................ 261
Table 69 SECURITY > VPN > VPN Rules (Manual) ........................................................................... 263
Table 70 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................................. 264
Table 71 SECURITY > VPN > SA Monitor ..........................................................................................267
Table 72 SECURITY > VPN > Global Setting ......................................................................................268
Table 73 Telecommuters Sharing One VPN Rule Example ................................................................. 269
Table 74 Telecommuters Using Unique VPN Rules Example ............................................................. 270
Table 75 SECURITY > CERTIFICATES > My Certificates .................................................................. 278
Table 76 SECURITY > CERTIFICATES > My Certificates > Details ................................................... 280
Table 77 SECURITY > CERTIFICATES > My Certificates > Export .................................................... 283
Table 78 SECURITY > CERTIFICATES > My Certificates > Import .................................................... 284
Table 79 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 .................................. 285
Table 80 SECURITY > CERTIFICATES > My Certificates > Create ................................................... 286
Table 81 SECURITY > CERTIFICATES > Trusted CAs ...................................................................... 288