
ZyWALL 5/35/70 Series User’s Guide
List of Tables 47
Table 82 SECURITY > ANTI-VIRUS > General ................................................................. 275
Table 83 SECURITY > ANTI-VIRUS > Signature: Query View .......................................... 277
Table 84 SECURITY > ANTI-SPAM > General .................................................................. 290
Table 85 SECURITY > ANTI-SPAM > External DB ............................................................ 293
Table 86 SECURITY > ANTI-SPAM > Lists ........................................................................ 295
Table 87 SECURITY > ANTI-SPAM > Lists > Edit ............................................................. 297
Table 88 SECURITY > CONTENT FILTER > General ....................................................... 300
Table 89 SECURITY > CONTENT FILTER > Categories .................................................. 304
Table 90 SECURITY > CONTENT FILTER > Customization ............................................. 311
Table 91 SECURITY > CONTENT FILTER > Cache ......................................................... 314
Table 92 SECURITY > VPN > VPN Rules (IKE) ................................................................ 326
Table 93 VPN Example: Matching ID Type and Content .................................................... 329
Table 94 VPN Example: Mismatching ID Type and Content .............................................. 329
Table 95 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ............................ 336
Table 96 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ............................. 344
Table 97 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy .......................... 347
Table 98 SECURITY > VPN > VPN Rules (Manual) .......................................................... 349
Table 99 SECURITY > VPN > VPN Rules (Manual) > Edit ................................................ 351
Table 100 SECURITY > VPN > SA Monitor ....................................................................... 353
Table 101 SECURITY > VPN > Global Setting .................................................................. 354
Table 102 Telecommuters Sharing One VPN Rule Example ............................................. 356
Table 103 Telecommuters Using Unique VPN Rules Example .......................................... 357
Table 104 SECURITY > CERTIFICATES > My Certificates ............................................... 366
Table 105 SECURITY > CERTIFICATES > My Certificates > Details ................................ 369
Table 106 SECURITY > CERTIFICATES > My Certificates > Export ................................ 371
Table 107 SECURITY > CERTIFICATES > My Certificates > Import ................................ 373
Table 108 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............... 374
Table 109 SECURITY > CERTIFICATES > My Certificates > Create ................................ 375
Table 110 SECURITY > CERTIFICATES > Trusted CAs ................................................... 377
Table 111 SECURITY > CERTIFICATES > Trusted CAs > Details .................................... 379
Table 112 SECURITY > CERTIFICATES > Trusted CAs Import ........................................ 382
Table 113 SECURITY > CERTIFICATES > Trusted Remote Hosts ................................... 383
Table 114 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................... 385
Table 115 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details .................... 386
Table 116 SECURITY > CERTIFICATES > Directory Servers ........................................... 389
Table 117 SECURITY > CERTIFICATES > Directory Server > Add .................................. 390
Table 118 SECURITY > AUTH SERVER > Local User Database ..................................... 393
Table 119 SECURITY > AUTH SERVER > RADIUS ......................................................... 394
Table 120 NAT Definitions .................................................................................................. 395
Table 121 NAT Mapping Types .......................................................................................... 399
Table 122 ADVANCED > NAT > NAT Overview ................................................................. 400
Table 123 ADVANCED > NAT > Address Mapping ............................................................ 402
Table 124 ADVANCED > NAT > Address Mapping > Edit ................................................. 404
Comentarios a estos manuales