List of Figures
ZyWALL 5/35/70 Series User’s Guide
30
Figure 39 VPN Wizard Setup Complete
...............................................................................................
104
Figure 40 Anti-Spam Wizard: Email Server Location Setting
..............................................................
105
Figure 41 Anti-Spam Wizard: Direction Recommendations
.................................................................
106
Figure 42 Anti-Spam Wizard: Direction Configuration
..........................................................................
107
Figure 43 Anti-Spam Wizard: Setup Complete
.....................................................................................
108
Figure 44 Dynamic VPN Rule Example
................................................................................................
109
Figure 45 VPN Gateway Policy Edit Screens
........................................................................................
112
Figure 46 SECURITY > VPN > Add Network Policy (ZyWALL A)
.........................................................
113
Figure 47 VPN Network Policy Edit Screens
.........................................................................................
114
Figure 48 Activate VPN Rule (ZyWALL B)
...........................................................................................
115
Figure 49 Tutorial: VPN Summary Screens Comparison Example
.......................................................
116
Figure 50 Check The Telecommuter's Computer IP Address
...............................................................
117
Figure 51 Telecommuter Pinging a Network X IP Address Example
.....................................................
118
Figure 52 Additional Dynamic VPN Rules Example
..............................................................................
119
Figure 53 IDP for From VPN Traffic
......................................................................................................
120
Figure 54 IDP Configuration for Traffic From VPN
...............................................................................
121
Figure 55 IDP for To VPN Traffic
..........................................................................................................
121
Figure 56 IDP Configuration for To VPN Traffic
....................................................................................
122
Figure 57 Firewall Rule for VPN
...........................................................................................................
123
Figure 58 SECURITY > VPN > VPN Rules (IKE)
.................................................................................
123
Figure 59 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy
...........................................
124
Figure 60 SECURITY > VPN > VPN Rules (IKE): With Gateway Policy Example
...............................
125
Figure 61 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy
.............................................
126
Figure 62 SECURITY > FIREWALL > Rule Summary
.........................................................................
127
Figure 63 SECURITY > FIREWALL > Rule Summary > Edit: Allow
...................................................
128
Figure 64 SECURITY > FIREWALL > Rule Summary: Allow
...............................................................
129
Figure 65 SECURITY > FIREWALL > Default Rule: Block From VPN To LAN
....................................
130
Figure 66 Tutorial: NETWORK > WAN > 3G (WAN2)
.......................................................................
131
Figure 67 Tutorial: Home
.....................................................................................................................
132
Figure 68 Tutorial: NETWORK > WAN > General
.............................................................................
133
Figure 69 SECURITY > CONTENT FILTER > General
........................................................................
134
Figure 70 SECURITY > CONTENT FILTER > Policy
...........................................................................
135
Figure 71 SECURITY > CONTENT FILTER > Policy > External Database (Default)
..........................
135
Figure 72 HOME > Show DHCP Table
.................................................................................................
136
Figure 73 SECURITY > CONTENT FILTER > Policy
...........................................................................
136
Figure 74 SECURITY > CONTENT FILTER > Policy > Insert
..............................................................
137
Figure 75 SECURITY > CONTENT FILTER > Policy
...........................................................................
137
Figure 76 SECURITY > CONTENT FILTER > Policy > Schedule (Bob)
..............................................
138
Figure 77 SECURITY > CONTENT FILTER > Policy
...........................................................................
138
Figure 78 SECURITY > CONTENT FILTER > Policy > External Database (Bob)
...............................
139
Figure 79 REGISTRATION > Registration
...........................................................................................
143
Figure 80 REGISTRATION > Registration: Registered Device
............................................................
144
Figure 81 REGISTRATION > Service
...................................................................................................
145