beautypg.com

ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual

Page 15

background image

Prestige 2602HW Series User’s Guide

Table of Contents

15

14.4.2 WAN to LAN Rules ...............................................................................172
14.4.3 Alerts .....................................................................................................173

14.5 Configuring Basic Firewall Settings ................................................................173
14.6 Rule Summary ...............................................................................................174

14.6.1 Configuring Firewall Rules ....................................................................176

14.7 Customized Services .....................................................................................179
14.8 Creating/Editing A Customized Service .........................................................179
14.9 Example Firewall Rule ...................................................................................180
14.10 Predefined Services .....................................................................................184
14.11 Anti-Probing ..................................................................................................186
14.12 DOS Thresholds ...........................................................................................187

14.12.1 Threshold Values ................................................................................188
14.12.2 Half-Open Sessions ............................................................................188

14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................188

Chapter 15
Content Filtering ..................................................................................................
191

15.1 Content Filtering Overview .............................................................................191
15.2 Configuring Keyword Blocking .......................................................................191
15.3 Configuring the Schedule ..............................................................................192
15.4 Configuring Trusted Computers .....................................................................193

Chapter 16
Introduction to IPSec ...........................................................................................
195

16.1 VPN Overview ................................................................................................195

16.1.1 IPSec ....................................................................................................195
16.1.2 Security Association .............................................................................195
16.1.3 Other Terminology ................................................................................195

16.1.3.1 Encryption ...................................................................................195
16.1.3.2 Data Confidentiality .....................................................................196
16.1.3.3 Data Integrity ...............................................................................196
16.1.3.4 Data Origin Authentication ..........................................................196

16.1.4 VPN Applications ..................................................................................196

16.2 IPSec Architecture .........................................................................................197

16.2.1 IPSec Algorithms ..................................................................................197
16.2.2 Key Management ..................................................................................197

16.3 Encapsulation .................................................................................................197

16.3.1 Transport Mode ....................................................................................198
16.3.2 Tunnel Mode ........................................................................................198

16.4 IPSec and NAT ...............................................................................................198