ZyXEL Communications P-334W User Manual

Page 13

Advertising
background image

Prestige 334W User’s Guide

Table of Contents

xiii

13.3

The Firewall, NAT and Remote Management ..................................................................... 13-5

13.3.1

LAN-to-WAN rules ............................................................................................................. 13-5

13.3.2

WAN-to-LAN rules ............................................................................................................. 13-5

13.4

Configuring Content Filtering .............................................................................................. 13-6

13.5

Services.................................................................................................................................... 13-8

Remote Management and VPN/IPSec...........................................................................................................V

Chapter 14 Remote Management Screens ............................................................................................... 14-1

14.1

Remote Management Overview ............................................................................................ 14-1

14.1.1

Remote Management Limitations ........................................................................................ 14-2

14.1.2

Remote Management and NAT............................................................................................ 14-2

14.1.3

System Timeout ................................................................................................................... 14-2

14.2

Configuring WWW ................................................................................................................ 14-2

14.3

Configuring Telnet ................................................................................................................. 14-4

14.4

Configuring TELNET............................................................................................................ 14-4

14.5

Configuring FTP .................................................................................................................... 14-6

14.6

SNMP ...................................................................................................................................... 14-7

14.6.1

Supported MIBs ................................................................................................................... 14-9

14.6.2

SNMP Traps......................................................................................................................... 14-9

14.6.3

Configuring SNMP ............................................................................................................ 14-10

14.7

Configuring DNS...................................................................................................................14-11

14.8

Configuring Security............................................................................................................ 14-13

Chapter 15 Introduction to IPSec............................................................................................................. 15-1

15.1

VPN Overview ........................................................................................................................ 15-1

15.1.1

IPSec .................................................................................................................................... 15-1

15.1.2

Security Association............................................................................................................. 15-1

15.1.3

Other Terminology............................................................................................................... 15-1

15.1.4

VPN Applications ................................................................................................................ 15-2

15.2

IPSec Architecture.................................................................................................................. 15-3

15.2.1

IPSec Algorithms ................................................................................................................. 15-3

15.2.2

Key Management ................................................................................................................. 15-4

15.3

Encapsulation ......................................................................................................................... 15-4

15.3.1

Transport Mode.................................................................................................................... 15-4

15.3.2

Tunnel Mode ........................................................................................................................ 15-4

15.4

IPSec and NAT ....................................................................................................................... 15-5

Chapter 16 VPN Screens ........................................................................................................................... 16-1

16.1

VPN/IPSec Overview ............................................................................................................. 16-1

16.2

IPSec Algorithms.................................................................................................................... 16-1

16.2.1

AH (Authentication Header) Protocol.................................................................................. 16-1

16.2.2

ESP (Encapsulating Security Payload) Protocol .................................................................. 16-2

16.3

My IP Address ........................................................................................................................ 16-2

16.4

Secure Gateway Address........................................................................................................ 16-2

Advertising