Table of Contents
12.4.1 Threshold Values ................................................................................................... 244
12.5.4 Triangle Route ........................................................................................................ 249
Content Filtering ................................................................................................................... 253
13.1 Overview ......................................................................................................................... 253
13.1.3 Before You Begin ................................................................................................... 253
13.2 The Keyword Screen ...................................................................................................... 256
13.3 The Schedule Screen ..................................................................................................... 257
13.4 The Trusted Screen ........................................................................................................ 258
VPN......................................................................................................................................... 259
14.1 Overview .......................................................................................................................... 259
14.1.3 Before You Begin ................................................................................................... 261
14.2 VPN Setup Screen ......................................................................................................... 262
14.3 The VPN Edit Screen ..................................................................................................... 264
14.5 Manual Key Setup ........................................................................................................... 273
14.7 Viewing SA Monitor ........................................................................................................ 277
14.9.1 IPSec Architecture ................................................................................................. 280
14.9.2 IPSec and NAT ....................................................................................................... 280
14.9.4 Encapsulation ......................................................................................................... 283
14.9.5 IKE Phases ........................................................................................................... 284
14.9.6 Negotiation Mode ................................................................................................... 285
14.9.7 Keep Alive .............................................................................................................. 285
16
P-2612HW-F1 User's Guide