
P-2602HWNLI User’s Guide
18 Table of Contents
14.10.1 Threshold Values ................................................................................227
14.10.2 Half-Open Sessions ............................................................................228
14.10.2.1 TCP Maximum Incomplete and Blocking Time .........................228
14.10.3 Configuring Firewall Thresholds .........................................................229
Chapter 15
Content Filtering .................................................................................................. 231
15.1 Content Filtering Overview ............................................................................231
15.2 Configuring Keyword Blocking .....................................................................231
15.3 Configuring the Schedule .............................................................................232
15.4 Configuring Trusted Computers ...................................................................233
Chapter 16
Introduction to IPSec ........................................................................................... 235
16.1 VPN Overview ................................................................................................235
16.1.1 IPSec ....................................................................................................235
16.1.2 Security Association .............................................................................235
16.1.3 Other Terminology ................................................................................235
16.1.3.1 Encryption ...................................................................................235
16.1.3.2 Data Confidentiality .....................................................................236
16.1.3.3 Data Integrity ...............................................................................236
16.1.3.4 Data Origin Authentication ..........................................................236
16.1.4 VPN Applications ..................................................................................236
16.2 IPSec Architecture .........................................................................................237
16.2.1 IPSec Algorithms ..................................................................................237
16.2.2 Key Management ..................................................................................237
16.3 Encapsulation .................................................................................................237
16.3.1 Transport Mode ....................................................................................238
16.3.2 Tunnel Mode ........................................................................................238
16.4 IPSec and NAT ...............................................................................................238
Chapter 17
VPN Screens......................................................................................................... 241
17.1 VPN/IPSec Overview .....................................................................................241
17.2 IPSec Algorithms ............................................................................................241
17.2.1 AH (Authentication Header) Protocol ....................................................241
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................241
17.3 My IP Address ................................................................................................242
17.4 Secure Gateway Address ..............................................................................243
17.4.1 Dynamic Secure Gateway Address ......................................................243
17.5 VPN Setup Screen .........................................................................................243
17.6 Keep Alive ......................................................................................................245
17.7 VPN, NAT, and NAT Traversal .......................................................................246
Comentarios a estos manuales