ZyXEL Communications P-334W User Manual
Page 13

Prestige 334W User’s Guide
Table of Contents
xiii
13.3
The Firewall, NAT and Remote Management ..................................................................... 13-5
13.3.1
LAN-to-WAN rules ............................................................................................................. 13-5
13.3.2
WAN-to-LAN rules ............................................................................................................. 13-5
13.4
Configuring Content Filtering .............................................................................................. 13-6
13.5
Services.................................................................................................................................... 13-8
Remote Management and VPN/IPSec...........................................................................................................V
Chapter 14 Remote Management Screens ............................................................................................... 14-1
14.1
Remote Management Overview ............................................................................................ 14-1
14.1.1
Remote Management Limitations ........................................................................................ 14-2
14.1.2
Remote Management and NAT............................................................................................ 14-2
14.1.3
System Timeout ................................................................................................................... 14-2
14.2
Configuring WWW ................................................................................................................ 14-2
14.3
Configuring Telnet ................................................................................................................. 14-4
14.4
Configuring TELNET............................................................................................................ 14-4
14.5
Configuring FTP .................................................................................................................... 14-6
14.6
SNMP ...................................................................................................................................... 14-7
14.6.1
Supported MIBs ................................................................................................................... 14-9
14.6.2
SNMP Traps......................................................................................................................... 14-9
14.6.3
Configuring SNMP ............................................................................................................ 14-10
14.7
Configuring DNS...................................................................................................................14-11
14.8
Configuring Security............................................................................................................ 14-13
Chapter 15 Introduction to IPSec............................................................................................................. 15-1
15.1
VPN Overview ........................................................................................................................ 15-1
15.1.1
IPSec .................................................................................................................................... 15-1
15.1.2
Security Association............................................................................................................. 15-1
15.1.3
Other Terminology............................................................................................................... 15-1
15.1.4
VPN Applications ................................................................................................................ 15-2
15.2
IPSec Architecture.................................................................................................................. 15-3
15.2.1
IPSec Algorithms ................................................................................................................. 15-3
15.2.2
Key Management ................................................................................................................. 15-4
15.3
Encapsulation ......................................................................................................................... 15-4
15.3.1
Transport Mode.................................................................................................................... 15-4
15.3.2
Tunnel Mode ........................................................................................................................ 15-4
15.4
IPSec and NAT ....................................................................................................................... 15-5
Chapter 16 VPN Screens ........................................................................................................................... 16-1
16.1
VPN/IPSec Overview ............................................................................................................. 16-1
16.2
IPSec Algorithms.................................................................................................................... 16-1
16.2.1
AH (Authentication Header) Protocol.................................................................................. 16-1
16.2.2
ESP (Encapsulating Security Payload) Protocol .................................................................. 16-2
16.3
My IP Address ........................................................................................................................ 16-2
16.4
Secure Gateway Address........................................................................................................ 16-2