beautypg.com

ZyXEL Communications 802.11g Wireless ADSL2+ 4-port VoIP IAD P-2602HWNLI User Manual

Page 18

background image

P-2602HWNLI User’s Guide

18

Table of Contents

14.10.1 Threshold Values ................................................................................227
14.10.2 Half-Open Sessions ............................................................................228

14.10.2.1 TCP Maximum Incomplete and Blocking Time .........................228

14.10.3 Configuring Firewall Thresholds .........................................................229

Chapter 15
Content Filtering ..................................................................................................
231

15.1 Content Filtering Overview ............................................................................231
15.2 Configuring Keyword Blocking .....................................................................231
15.3 Configuring the Schedule .............................................................................232
15.4 Configuring Trusted Computers ...................................................................233

Chapter 16
Introduction to IPSec ...........................................................................................
235

16.1 VPN Overview ................................................................................................235

16.1.1 IPSec ....................................................................................................235
16.1.2 Security Association .............................................................................235
16.1.3 Other Terminology ................................................................................235

16.1.3.1 Encryption ...................................................................................235
16.1.3.2 Data Confidentiality .....................................................................236
16.1.3.3 Data Integrity ...............................................................................236
16.1.3.4 Data Origin Authentication ..........................................................236

16.1.4 VPN Applications ..................................................................................236

16.2 IPSec Architecture .........................................................................................237

16.2.1 IPSec Algorithms ..................................................................................237
16.2.2 Key Management ..................................................................................237

16.3 Encapsulation .................................................................................................237

16.3.1 Transport Mode ....................................................................................238
16.3.2 Tunnel Mode ........................................................................................238

16.4 IPSec and NAT ...............................................................................................238

Chapter 17
VPN Screens.........................................................................................................
241

17.1 VPN/IPSec Overview .....................................................................................241
17.2 IPSec Algorithms ............................................................................................241

17.2.1 AH (Authentication Header) Protocol ....................................................241
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................241

17.3 My IP Address ................................................................................................242
17.4 Secure Gateway Address ..............................................................................243

17.4.1 Dynamic Secure Gateway Address ......................................................243

17.5 VPN Setup Screen .........................................................................................243
17.6 Keep Alive ......................................................................................................245
17.7 VPN, NAT, and NAT Traversal .......................................................................246