List of Figures
ZyWALL 2WG User’s Guide
31
Figure 168 Using IP Alias to Solve the Triangle Route Problem .......................................................... 265
Figure 169 Three-Way Handshake ....................................................................................................... 265
Figure 170 Content Filtering Lookup Procedure ................................................................................... 268
Figure 171 SECURITY > CONTENT FILTER > General ...................................................................... 269
Figure 172 SECURITY > CONTENT FILTER > Policy ......................................................................... 272
Figure 173 SECURITY > CONTENT FILTER > Policy > General ........................................................ 273
Figure 174 SECURITY > CONTENT FILTER > Policy > External Database ....................................... 275
Figure 175 SECURITY > CONTENT FILTER > Policy > Customization .............................................. 282
Figure 176 SECURITY > CONTENT FILTER > Policy > Schedule ...................................................... 284
Figure 177 SECURITY > CONTENT FILTER > Object ........................................................................ 286
Figure 178 SECURITY > CONTENT FILTER > Cache ........................................................................ 288
Figure 179 myZyXEL.com: Login ......................................................................................................... 290
Figure 180 myZyXEL.com: Welcome ................................................................................................... 290
Figure 181 myZyXEL.com: Service Management ................................................................................ 291
Figure 182 Blue Coat: Login ................................................................................................................. 291
Figure 183 Content Filtering Reports Main Screen .............................................................................. 292
Figure 184 Blue Coat: Report Home .................................................................................................... 292
Figure 185 Global Report Screen Example .......................................................................................... 293
Figure 186 Requested URLs Example ................................................................................................. 294
Figure 187 Web Page Review Process Screen ................................................................................... 295
Figure 188 VPN: Example .................................................................................................................... 297
Figure 189 VPN: IKE SA and IPSec SA .............................................................................................. 298
Figure 190 Gateway and Network Policies .......................................................................................... 299
Figure 191 IPSec Fields Summary ..................................................................................................... 299
Figure 192 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 300
Figure 193 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 302
Figure 194 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 308
Figure 195 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 313
Figure 196 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 314
Figure 197 VPN Rule Configured ......................................................................................................... 315
Figure 198 VPN Dial ............................................................................................................................. 315
Figure 199 VPN Tunnel Established ..................................................................................................... 315
Figure 200 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 316
Figure 201 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 318
Figure 202 SECURITY > VPN > SA Monitor ...................................................................................... 321
Figure 203 Overlap in a Dynamic VPN Rule ........................................................................................ 322
Figure 204 Overlap in IP Alias and VPN Remote Networks ................................................................. 322
Figure 205 SECURITY > VPN > Global Setting ................................................................................. 323
Figure 206 Telecommuters Sharing One VPN Rule Example .............................................................. 325
Figure 207 Telecommuters Using Unique VPN Rules Example ........................................................... 326
Figure 208 VPN for Remote Management Example ............................................................................ 327
Figure 209 VPN Topologies .................................................................................................................. 327
Figure 210 Hub-and-spoke VPN Example ........................................................................................... 328