beautypg.com

ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual

Page 16

background image

ZyWALL 5/35/70 Series User’s Guide

Table of Contents

16

16.6.2 Full Path URL Checking .......................................................................286
16.6.3 File Name URL Checking .....................................................................286

Chapter 17
Content Filtering Reports ....................................................................................
290

17.1 Checking Content Filtering Activation ............................................................290
17.2 Viewing Content Filtering Reports ..................................................................290
17.3 Web Site Submission .....................................................................................295

Chapter 18
Introduction to IPSec ...........................................................................................
298

18.1 VPN Overview ................................................................................................298

18.1.1 IPSec ....................................................................................................298
18.1.2 Security Association .............................................................................298
18.1.3 Other Terminology ................................................................................298

18.1.3.1 Encryption ...................................................................................298
18.1.3.2 Data Confidentiality .....................................................................299
18.1.3.3 Data Integrity ...............................................................................299
18.1.3.4 Data Origin Authentication ..........................................................299

18.1.4 VPN Applications ..................................................................................299

18.1.4.1 Linking Two or More Private Networks Together .........................299
18.1.4.2 Accessing Network Resources When NAT Is Enabled ...............299
18.1.4.3 Unsupported IP Applications .......................................................299

18.2 IPSec Architecture .........................................................................................300

18.2.1 IPSec Algorithms ..................................................................................300
18.2.2 Key Management ..................................................................................300

18.3 Encapsulation .................................................................................................300

18.3.1 Transport Mode ....................................................................................301
18.3.2 Tunnel Mode .........................................................................................301

18.4 IPSec and NAT ...............................................................................................301

Chapter 19
VPN Screens.........................................................................................................
304

19.1 VPN/IPSec Overview .....................................................................................304
19.2 IPSec Algorithms ............................................................................................304

19.2.1 AH (Authentication Header) Protocol ....................................................304
19.2.2 ESP (Encapsulating Security Payload) Protocol ..................................304

19.3 My ZyWALL ....................................................................................................305
19.4 Remote Gateway Address .............................................................................305

19.4.1 Dynamic Remote Gateway Address .....................................................306

19.5 Nailed Up .......................................................................................................306
19.6 NAT Traversal ................................................................................................306

19.6.1 NAT Traversal Configuration .................................................................307