Table of Contents
ZyWALL 5/35/70 Series User’s Guide
18
16.1 Content Filtering Overview .............................................................................................. 321
16.1.1 Restrict Web Features ........................................................................................... 321
16.1.2 Create a Filter List .................................................................................................. 321
16.1.3 Customize Web Site Access ................................................................................. 321
16.2 Content Filtering with an External Database ................................................................... 321
16.3 Content Filter General Screen ........................................................................................ 322
16.4 Content Filter Policy ..................................................................................................... 325
16.5 Content Filter Policy: General ......................................................................................... 327
16.6 Content Filter Policy: External Database ........................................................................ 329
16.7 Content Filter Policy: Customization ............................................................................... 336
16.8 Content Filter Policy: Schedule ...................................................................................... 337
16.9 Content Filter Object ....................................................................................................... 338
16.10 Content Filtering Cache ................................................................................................ 340
Chapter 17
Content Filtering Reports.....................................................................................................343
17.1 Checking Content Filtering Activation .............................................................................. 343
17.2 Viewing Content Filtering Reports ................................................................................... 343
17.3 Web Site Submission .......................................................................................................348
Chapter 18
IPSec VPN..............................................................................................................................351
18.1 IPSec VPN Overview ..................................................................................................... 351
18.1.1 IKE SA Overview .................................................................................................... 352
18.2 VPN Rules (IKE) .............................................................................................................. 353
18.3 IKE SA Setup .................................................................................................................. 355
18.3.1 IKE SA Proposal .................................................................................................... 355
18.4 Additional IPSec VPN Topics ........................................................................................... 360
18.4.1 SA Life Time ........................................................................................................... 360
18.4.2 IPSec High Availability ........................................................................................... 361
18.4.3 Encryption and Authentication Algorithms ............................................................. 361
18.5 VPN Rules (IKE) Gateway Policy Edit ............................................................................. 362
18.6 IPSec SA Overview .....................................................................................................368
18.6.1 Local and Remote Networks .................................................................................. 368
18.6.2 Virtual Address Mapping ........................................................................................ 369
18.6.3 Active Protocol ....................................................................................................... 370
18.6.4 Encapsulation ......................................................................................................... 370
18.6.5 IPSec SA Proposal and Perfect Forward Secrecy ................................................. 371
18.7 Network Policy Edit ......................................................................................................... 372
18.8 Network Policy Edit: Port Forwarding ............................................................................. 377
18.9 Network Policy Move .....................................................................................................379
18.10 IPSec SA Using Manual Keys ................................................................................... 380
18.10.1 IPSec SA Proposal Using Manual Keys ............................................................... 380