ZyXEL Communications ZyXEL ZyWALL 2WG User Manual

Page 32

Advertising
background image

List of Figures

ZyWALL 2WG User’s Guide

32

Figure 125 My Service Firewall Rule Example: Rule Summary ........................................................... 230
Figure 126 SECURITY > CONTENT FILTER > General ...................................................................... 232
Figure 127 Content Filtering Lookup Procedure ................................................................................... 234
Figure 128 SECURITY > CONTENT FILTER > Categories ................................................................. 236
Figure 129 SECURITY > CONTENT FILTER > Customization ............................................................ 244
Figure 130 SECURITY > CONTENT FILTER > Cache ........................................................................ 247
Figure 131 myZyXEL.com: Login ......................................................................................................... 250
Figure 132 myZyXEL.com: Welcome ................................................................................................... 250
Figure 133 myZyXEL.com: Service Management ................................................................................ 251
Figure 134 Blue Coat: Login ................................................................................................................. 251
Figure 135 Content Filtering Reports Main Screen .............................................................................. 252
Figure 136 Blue Coat: Report Home .................................................................................................... 252
Figure 137 Global Report Screen Example .......................................................................................... 253
Figure 138 Requested URLs Example ................................................................................................. 254
Figure 139 Web Page Review Process Screen ................................................................................... 255
Figure 140 VPN: Example .................................................................................................................... 257
Figure 141 VPN: IKE SA and IPSec SA .............................................................................................. 258
Figure 142 Gateway and Network Policies .......................................................................................... 259
Figure 143 IPSec Fields Summary ..................................................................................................... 259
Figure 144 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 260
Figure 145 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ......................................... 261
Figure 146 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ...................................... 262
Figure 147 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 262
Figure 148 VPN/NAT Example ............................................................................................................. 265
Figure 149 IPSec High Availability ....................................................................................................... 266
Figure 150 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 268
Figure 151 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 274
Figure 152 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 276
Figure 153 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 280
Figure 154 VPN Rule Configured ......................................................................................................... 281
Figure 155 VPN Dial ............................................................................................................................. 281
Figure 156 VPN Tunnel Established ..................................................................................................... 281
Figure 157 VPN Log Example ............................................................................................................. 282
Figure 158 IKE/IPSec Debug Example ............................................................................................... 283
Figure 159 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 285
Figure 160 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 286
Figure 161 SECURITY > VPN > SA Monitor ...................................................................................... 289
Figure 162 SECURITY > VPN > Global Setting ................................................................................. 290
Figure 163 Telecommuters Sharing One VPN Rule Example .............................................................. 292
Figure 164 Telecommuters Using Unique VPN Rules Example ........................................................... 293
Figure 165 VPN for Remote Management Example ............................................................................ 294
Figure 166 VPN Topologies .................................................................................................................. 294
Figure 167 Hub-and-spoke VPN Example ........................................................................................... 295

Advertising