List of Tables
ZyWALL 2 Plus User’s Guide
40
Table 39 NETWORK > DMZ > Static DHCP ........................................................................................ 175
Table 40 NETWORK > DMZ > IP Alias ............................................................................................... 176
Table 41 NETWORK > DMZ > Port Roles ........................................................................................... 179
Table 42 NETWORK > WLAN ............................................................................................................. 182
Table 43 NETWORK > WLAN > Static DHCP ..................................................................................... 185
Table 44 NETWORK > WLAN > IP Alias ............................................................................................. 186
Table 45 NETWORK > WLAN > Port Roles ........................................................................................ 188
Table 46 Blocking All LAN to WAN IRC Traffic Example ..................................................................... 200
Table 47 Limited LAN to WAN IRC Traffic Example ............................................................................ 201
Table 48 SECURITY > FIREWALL > Default Rule (Router Mode) ...................................................... 203
Table 49 SECURITY > FIREWALL > Default Rule (Bridge Mode) ...................................................... 205
Table 50 SECURITY > FIREWALL > Rule Summary .......................................................................... 207
Table 51 SECURITY > FIREWALL > Rule Summary > Edit ................................................................ 210
Table 52 SECURITY > FIREWALL > Anti-Probing .............................................................................. 212
Table 53 SECURITY > FIREWALL > Threshold .................................................................................. 214
Table 54 SECURITY > FIREWALL > Service ...................................................................................... 215
Table 55 SECURITY > FIREWALL > Service > Add ........................................................................... 216
Table 56 SECURITY > CONTENT FILTER > General ........................................................................ 225
Table 57 SECURITY > CONTENT FILTER > Policy ........................................................................... 228
Table 58 SECURITY > CONTENT FILTER > Policy > General ........................................................... 229
Table 59 SECURITY > CONTENT FILTER > Policy > External Database .......................................... 231
Table 60 SECURITY > CONTENT FILTER > Policy > Customization ................................................. 238
Table 61 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................ 240
Table 62 SECURITY > CONTENT FILTER > Object ........................................................................... 241
Table 63 SECURITY > CONTENT FILTER > Cache ........................................................................... 244
Table 64 SECURITY > VPN > VPN Rules (IKE) ................................................................................. 256
Table 65 VPN Example: Matching ID Type and Content ..................................................................... 259
Table 66 VPN Example: Mismatching ID Type and Content ............................................................... 259
Table 67 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................................. 266
Table 68 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy .............................................. 275
Table 69 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ................. 279
Table 70 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ............................................ 280
Table 71 SECURITY > VPN > VPN Rules (Manual) ........................................................................... 282
Table 72 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................................. 283
Table 73 SECURITY > VPN > SA Monitor .......................................................................................... 286
Table 74 SECURITY > VPN > Global Setting ...................................................................................... 288
Table 75 Telecommuters Sharing One VPN Rule Example ................................................................. 290
Table 76 Telecommuters Using Unique VPN Rules Example ............................................................. 291
Table 77 SECURITY > CERTIFICATES > My Certificates .................................................................. 298
Table 78 SECURITY > CERTIFICATES > My Certificates > Details ................................................... 300
Table 79 SECURITY > CERTIFICATES > My Certificates > Export .................................................... 303
Table 80 SECURITY > CERTIFICATES > My Certificates > Import .................................................... 304
Table 81 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 .................................. 305
Summary of Contents for ADSL 2+ Security Gateway
Page 2: ......
Page 25: ...Table of Contents ZyWALL 2 Plus User s Guide 25 Index 679 ...
Page 26: ...Table of Contents ZyWALL 2 Plus User s Guide 26 ...
Page 46: ...46 ...
Page 88: ...Chapter 3 Wizard Setup ZyWALL 2 Plus User s Guide 88 ...
Page 132: ...132 ...
Page 144: ...Chapter 6 LAN Screens ZyWALL 2 Plus User s Guide 144 ...
Page 180: ...Chapter 9 DMZ Screens ZyWALL 2 Plus User s Guide 180 ...
Page 190: ...190 ...
Page 222: ...Chapter 11 Firewall ZyWALL 2 Plus User s Guide 222 ...
Page 252: ...Chapter 13 Content Filtering Reports ZyWALL 2 Plus User s Guide 252 ...
Page 328: ...Chapter 16 Authentication Server ZyWALL 2 Plus User s Guide 328 ...
Page 330: ...330 ...
Page 346: ...Chapter 17 Network Address Translation NAT ZyWALL 2 Plus User s Guide 346 ...
Page 350: ...Chapter 18 Static Route ZyWALL 2 Plus User s Guide 350 ...
Page 398: ...Chapter 21 Remote Management ZyWALL 2 Plus User s Guide 398 ...
Page 416: ...Chapter 24 ALG Screen ZyWALL 2 Plus User s Guide 416 ...
Page 417: ...417 PART V Logs and Maintenance Logs Screens 419 Maintenance 447 ...
Page 418: ...418 ...
Page 423: ...Chapter 25 Logs Screens ZyWALL 2 Plus User s Guide 423 Figure 274 LOGS Log Settings ...
Page 466: ...466 ...
Page 474: ...Chapter 27 Introducing the SMT ZyWALL 2 Plus User s Guide 474 ...
Page 496: ...Chapter 30 LAN Setup ZyWALL 2 Plus User s Guide 496 ...
Page 504: ...Chapter 32 DMZ Setup ZyWALL 2 Plus User s Guide 504 ...
Page 508: ...Chapter 33 Wireless Setup ZyWALL 2 Plus User s Guide 508 ...
Page 556: ...Chapter 38 Filter Configuration ZyWALL 2 Plus User s Guide 556 ...
Page 570: ...Chapter 40 System Information Diagnosis ZyWALL 2 Plus User s Guide 570 ...
Page 586: ...Chapter 41 Firmware and Configuration File Maintenance ZyWALL 2 Plus User s Guide 586 ...
Page 594: ...Chapter 42 System Maintenance Menus 8 to 10 ZyWALL 2 Plus User s Guide 594 ...
Page 598: ...Chapter 43 Remote Management ZyWALL 2 Plus User s Guide 598 ...
Page 604: ...604 ...
Page 612: ...Chapter 45 Troubleshooting ZyWALL 2 Plus User s Guide 612 ...
Page 620: ...620 ...
Page 644: ...Appendix B Pop up Windows JavaScripts and Java Permissions ZyWALL 2 Plus User s Guide 644 ...
Page 668: ...Appendix E Importing Certificates ZyWALL 2 Plus User s Guide 668 ...
Page 672: ...Appendix F Legal Information ZyWALL 2 Plus User s Guide 672 ...
Page 678: ...Appendix G Customer Support ZyWALL 2 Plus User s Guide 678 ...