ZyXEL Communications P-2612HW-F1 User Manual page 16

802.11g wireless adsl voip iad
Hide thumbs Also See for P-2612HW-F1:
Table of Contents

Advertisement

Table of Contents
12.3.3 Configuring a Customized Service ....................................................................... 243
12.4 The Firewall Threshold Screen ........................................................................................ 243
12.4.1 Threshold Values ................................................................................................... 244
12.4.2 Configuring Firewall Thresholds ............................................................................. 245
12.5 Firewall Technical Reference ........................................................................................... 247
12.5.1 Firewall Rules Overview ......................................................................................... 247
12.5.2 Guidelines For Enhancing Security With Your Firewall .......................................... 248
12.5.3 Security Considerations ......................................................................................... 249
12.5.4 Triangle Route ........................................................................................................ 249
Content Filtering ................................................................................................................... 253
13.1 Overview ......................................................................................................................... 253
13.1.1 What You Can Do in the Content Filter Screens .................................................... 253
13.1.2 What You Need to Know About Content Filtering .................................................. 253
13.1.3 Before You Begin ................................................................................................... 253
13.1.4 Content Filtering Example ...................................................................................... 254
13.2 The Keyword Screen ...................................................................................................... 256
13.3 The Schedule Screen ..................................................................................................... 257
13.4 The Trusted Screen ........................................................................................................ 258
VPN......................................................................................................................................... 259
14.1 Overview .......................................................................................................................... 259
14.1.1 What You Can Do in the VPN Screens .................................................................. 259
14.1.2 What You Need to Know About IPSec VPN ........................................................... 260
14.1.3 Before You Begin ................................................................................................... 261
14.2 VPN Setup Screen ......................................................................................................... 262
14.3 The VPN Edit Screen ..................................................................................................... 264
14.4 Configuring Advanced IKE Settings ............................................................................... 270
14.5 Manual Key Setup ........................................................................................................... 273
14.5.1 Security Parameter Index (SPI) ............................................................................ 273
14.6 Configuring Manual Key ................................................................................................. 274
14.7 Viewing SA Monitor ........................................................................................................ 277
14.8 Configuring VPN Global Setting ..................................................................................... 279
14.9 IPSec VPN Technical Reference ..................................................................................... 279
14.9.1 IPSec Architecture ................................................................................................. 280
14.9.2 IPSec and NAT ....................................................................................................... 280
14.9.3 VPN, NAT, and NAT Traversal ............................................................................... 281
14.9.4 Encapsulation ......................................................................................................... 283
14.9.5 IKE Phases ........................................................................................................... 284
14.9.6 Negotiation Mode ................................................................................................... 285
14.9.7 Keep Alive .............................................................................................................. 285
16
P-2612HW-F1 User's Guide

Advertisement

Table of Contents
loading

Table of Contents