ZyXEL Communications 802.11g ADSL 2+ 4-Port Security Gateway HW-D Series User Manual

Page 17

Advertising
background image

P-662H/HW-D Series User’s Guide

Table of Contents

17

13.4 Configuring Trusted Computers ....................................................................213

Chapter 14
Content Access Control ......................................................................................
215

14.1 Content Access Control Overview .................................................................215

14.1.1 Content Access Control WLAN Application ..........................................215
14.1.2 Configuration Steps ..............................................................................215

14.2 Activating CAC and Creating User Groups ..................................................216

14.2.1 Configuring Time Schedule ..................................................................217
14.2.2 Configuring Services .............................................................................219

14.2.2.1 Available Services .......................................................................220

14.2.3 Configuring Web Site Filters .................................................................222
14.2.4 Testing Web Site Access Privileges ......................................................227

14.3 User Account Setup ......................................................................................228
14.4 User Online Status ........................................................................................229
14.5 Content Access Control Logins ......................................................................230

14.5.1 User Login ............................................................................................230
14.5.2 Administrator Login ...............................................................................231

Chapter 15
Introduction to IPSec ...........................................................................................
233

15.1 VPN Overview ................................................................................................233

15.1.1 IPSec ....................................................................................................233
15.1.2 Security Association .............................................................................233
15.1.3 Other Terminology ................................................................................233

15.1.3.1 Encryption ...................................................................................233
15.1.3.2 Data Confidentiality .....................................................................234
15.1.3.3 Data Integrity ...............................................................................234
15.1.3.4 Data Origin Authentication ..........................................................234

15.1.4 VPN Applications ..................................................................................234

15.2 IPSec Architecture .........................................................................................235

15.2.1 IPSec Algorithms ..................................................................................235
15.2.2 Key Management ..................................................................................235

15.3 Encapsulation .................................................................................................235

15.3.1 Transport Mode ....................................................................................236
15.3.2 Tunnel Mode ........................................................................................236

15.4 IPSec and NAT ...............................................................................................236

Chapter 16
VPN Screens.........................................................................................................
239

16.1 VPN/IPSec Overview .....................................................................................239
16.2 IPSec Algorithms ............................................................................................239

16.2.1 AH (Authentication Header) Protocol ....................................................239

Advertising
This manual is related to the following products: