ZyXEL Communications ZyXEL ZyWALL 35 User Manual

Page 14

Advertising
background image

ZyWALL 35 User’s Guide

12

Chapter 12
Content Filtering Registration and Reports.......................................................
221

12.1 Introduction to myZyXEL.com ........................................................................221

12.1.1 A Note on myZyXEL.com Numbers ......................................................222

12.2 myZyXEL.com Account Registration ..............................................................222
12.3 Registering Your ZyXEL Device .....................................................................224
12.4 Content Filtering Registration .........................................................................227
12.5 Checking Content Filtering Activation ............................................................229
12.6 Updating Product Registration Information ....................................................230
12.7 Viewing Content Filtering Reports ..................................................................230
12.8 Configuration File ...........................................................................................232

Chapter 13
Introduction to IPSec ...........................................................................................
233

13.1 VPN Overview ................................................................................................233

13.1.1 IPSec ....................................................................................................233
13.1.2 Security Association .............................................................................233
13.1.3 Other Terminology ................................................................................233

13.1.3.1 Encryption ...................................................................................233
13.1.3.2 Data Confidentiality .....................................................................234
13.1.3.3 Data Integrity ...............................................................................234
13.1.3.4 Data Origin Authentication ..........................................................234

13.1.4 VPN Applications ..................................................................................234

13.1.4.1 Linking Two or More Private Networks Together .........................234
13.1.4.2 Accessing Network Resources When NAT Is Enabled ...............234
13.1.4.3 Unsupported IP Applications .......................................................234

13.2 IPSec Architecture .........................................................................................234

13.2.1 IPSec Algorithms ..................................................................................235
13.2.2 Key Management ..................................................................................235

13.3 Encapsulation .................................................................................................235

13.3.1 Transport Mode ....................................................................................236
13.3.2 Tunnel Mode .........................................................................................236

13.4 IPSec and NAT ...............................................................................................236

Chapter 14
VPN Screens.........................................................................................................
239

14.1 VPN/IPSec Overview .....................................................................................239
14.2 IPSec Algorithms ............................................................................................239

14.2.1 AH (Authentication Header) Protocol ....................................................239
14.2.2 ESP (Encapsulating Security Payload) Protocol ..................................239

14.3 My IP Address ................................................................................................240
14.4 Secure Gateway Address ..............................................................................240

14.4.1 Dynamic Secure Gateway Address ......................................................241

Advertising