Zyxel-communications 802.11g Wireless ADSL2+ 4-port VoIP IAD P-2602HWNL Manual de usuario Pagina 18

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 442
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 17
P-2602HWNLI User’s Guide
18 Table of Contents
14.10.1 Threshold Values ................................................................................227
14.10.2 Half-Open Sessions ............................................................................228
14.10.2.1 TCP Maximum Incomplete and Blocking Time .........................228
14.10.3 Configuring Firewall Thresholds .........................................................229
Chapter 15
Content Filtering .................................................................................................. 231
15.1 Content Filtering Overview ............................................................................231
15.2 Configuring Keyword Blocking .....................................................................231
15.3 Configuring the Schedule .............................................................................232
15.4 Configuring Trusted Computers ...................................................................233
Chapter 16
Introduction to IPSec ........................................................................................... 235
16.1 VPN Overview ................................................................................................235
16.1.1 IPSec ....................................................................................................235
16.1.2 Security Association .............................................................................235
16.1.3 Other Terminology ................................................................................235
16.1.3.1 Encryption ...................................................................................235
16.1.3.2 Data Confidentiality .....................................................................236
16.1.3.3 Data Integrity ...............................................................................236
16.1.3.4 Data Origin Authentication ..........................................................236
16.1.4 VPN Applications ..................................................................................236
16.2 IPSec Architecture .........................................................................................237
16.2.1 IPSec Algorithms ..................................................................................237
16.2.2 Key Management ..................................................................................237
16.3 Encapsulation .................................................................................................237
16.3.1 Transport Mode ....................................................................................238
16.3.2 Tunnel Mode ........................................................................................238
16.4 IPSec and NAT ...............................................................................................238
Chapter 17
VPN Screens......................................................................................................... 241
17.1 VPN/IPSec Overview .....................................................................................241
17.2 IPSec Algorithms ............................................................................................241
17.2.1 AH (Authentication Header) Protocol ....................................................241
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................241
17.3 My IP Address ................................................................................................242
17.4 Secure Gateway Address ..............................................................................243
17.4.1 Dynamic Secure Gateway Address ......................................................243
17.5 VPN Setup Screen .........................................................................................243
17.6 Keep Alive ......................................................................................................245
17.7 VPN, NAT, and NAT Traversal .......................................................................246
Vista de pagina 17
1 2 ... 13 14 15 16 17 18 19 20 21 22 23 ... 441 442

Comentarios a estos manuales

Sin comentarios