List of Figures
ZyWALL 5/35/70 Series User’s Guide
33
Figure 168 SECURITY > IDP > Signature: Query View
.......................................................................
285
Figure 169 SECURITY > IDP > Signature: Query by Partial Name
.....................................................
287
Figure 170 SECURITY > IDP > Signature: Query by Complete ID
......................................................
288
Figure 171 Signature Query by Attribute.
.............................................................................................
289
Figure 172 SECURITY > IDP > Anomaly
.............................................................................................
290
Figure 173 SECURITY > IDP > Update
...............................................................................................
292
Figure 174 SECURITY > IDP > Backup & Restore
..............................................................................
294
Figure 175 ZyWALL Anti-virus Overview
...........................................................................................
299
Figure 176 SECURITY > ANTI-VIRUS > General
...............................................................................
302
Figure 177 SECURITY > ANTI-VIRUS > Signature: Query View
.........................................................
304
Figure 178 Query Example Search Criteria
..........................................................................................
305
Figure 179 Query Example Search Results
.........................................................................................
306
Figure 180 SECURITY > ANTI-VIRUS > Update
.................................................................................
307
Figure 181 SECURITY > ANTI-VIRUS > Backup and Restore
............................................................
309
Figure 182 Anti-spam Overview
...........................................................................................................
313
Figure 183 SECURITY > ANTI-SPAM > General
.................................................................................
316
Figure 184 SECURITY > ANTI-SPAM > External DB
..........................................................................
319
Figure 185 SECURITY > ANTI-SPAM > Lists
......................................................................................
321
Figure 186 SECURITY > ANTI-SPAM > Lists > Edit
...........................................................................
322
Figure 187 Content Filtering Lookup Procedure
...................................................................................
328
Figure 188 SECURITY > CONTENT FILTER > General
......................................................................
329
Figure 189 SECURITY > CONTENT FILTER > Policy
.........................................................................
331
Figure 190 SECURITY > CONTENT FILTER > Policy > General
........................................................
333
Figure 191 SECURITY > CONTENT FILTER > Policy > External Database
.......................................
334
Figure 192 SECURITY > CONTENT FILTER > Policy > Customization
..............................................
341
Figure 193 SECURITY > CONTENT FILTER > Policy > Schedule
......................................................
343
Figure 194 SECURITY > CONTENT FILTER > Object
........................................................................
344
Figure 195 SECURITY > CONTENT FILTER > Cache
........................................................................
346
Figure 196 myZyXEL.com: Login
.........................................................................................................
350
Figure 197 myZyXEL.com: Welcome
...................................................................................................
350
Figure 198 myZyXEL.com: Service Management
................................................................................
351
Figure 199 Blue Coat: Login
.................................................................................................................
351
Figure 200 Content Filtering Reports Main Screen
..............................................................................
352
Figure 201 Blue Coat: Report Home
....................................................................................................
352
Figure 202 Global Report Screen Example
..........................................................................................
353
Figure 203 Requested URLs Example
.................................................................................................
354
Figure 204 Web Page Review Process Screen
...................................................................................
355
Figure 205 VPN: Example
....................................................................................................................
357
Figure 206 VPN: IKE SA and IPSec SA
..............................................................................................
358
Figure 207 Gateway and Network Policies
..........................................................................................
359
Figure 208 IPSec Fields Summary
......................................................................................................
359
Figure 209 SECURITY > VPN > VPN Rules (IKE)
..............................................................................
360
Figure 210 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy
.........................................
362