EasyManua.ls Logo

ZyXEL Communications ZyWALL 2 Plus - Page 38

ZyXEL Communications ZyWALL 2 Plus
678 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Tables
ZyWALL 2 Plus User’s Guide
38
Table 39 NETWORK > DMZ ................................................................................................................ 162
Table 40 NETWORK > DMZ > Static DHCP ........................................................................................ 165
Table 41 NETWORK > DMZ > IP Alias ............................................................................................... 166
Table 42 NETWORK > DMZ > Port Roles ...........................................................................................169
Table 43 NETWORK > WLAN ............................................................................................................. 172
Table 44 NETWORK > WLAN > Static DHCP ..................................................................................... 175
Table 45 NETWORK > WLAN > IP Alias ............................................................................................. 176
Table 46 NETWORK > WLAN > Port Roles ........................................................................................ 178
Table 47 .............................................................................................................................................. 182
Table 48 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 189
Table 49 Limited LAN to WAN IRC Traffic Example ............................................................................ 189
Table 50 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 192
Table 51 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 194
Table 52 SECURITY > FIREWALL > Rule Summary .......................................................................... 195
Table 53 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 198
Table 54 SECURITY > FIREWALL > Anti-Probing .............................................................................. 200
Table 55 SECURITY > FIREWALL > Threshold .................................................................................. 202
Table 56 SECURITY > FIREWALL > Service ...................................................................................... 203
Table 57 SECURITY > FIREWALL > Service > Add ........................................................................... 204
Table 58 SECURITY > CONTENT FILTER > General ........................................................................ 212
Table 59 SECURITY > CONTENT FILTER > Categories .................................................................... 216
Table 60 SECURITY > CONTENT FILTER > Customization .............................................................. 222
Table 61 SECURITY > CONTENT FILTER > Cache ........................................................................... 225
Table 62 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 238
Table 63 VPN Example: Matching ID Type and Content ..................................................................... 241
Table 64 VPN Example: Mismatching ID Type and Content ............................................................... 241
Table 65 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................................. 247
Table 66 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy .............................................. 256
Table 67 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ................. 260
Table 68 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................ 261
Table 69 SECURITY > VPN > VPN Rules (Manual) ........................................................................... 263
Table 70 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................................. 264
Table 71 SECURITY > VPN > SA Monitor ..........................................................................................267
Table 72 SECURITY > VPN > Global Setting ......................................................................................268
Table 73 Telecommuters Sharing One VPN Rule Example ................................................................. 269
Table 74 Telecommuters Using Unique VPN Rules Example ............................................................. 270
Table 75 SECURITY > CERTIFICATES > My Certificates .................................................................. 278
Table 76 SECURITY > CERTIFICATES > My Certificates > Details ................................................... 280
Table 77 SECURITY > CERTIFICATES > My Certificates > Export .................................................... 283
Table 78 SECURITY > CERTIFICATES > My Certificates > Import .................................................... 284
Table 79 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 .................................. 285
Table 80 SECURITY > CERTIFICATES > My Certificates > Create ................................................... 286
Table 81 SECURITY > CERTIFICATES > Trusted CAs ...................................................................... 288

Table of Contents

Other manuals for ZyXEL Communications ZyWALL 2 Plus

Related product manuals