Prestige 662HW Series User's Guide
12.10 Predefined Services ............................................................................................................... 12-15
12.11 Anti-Probing .......................................................................................................................... 12-17
Chapter 13 Content Filtering.................................................................................................................... 13-1
14.1 Overview ................................................................................................................................. 14-1
VPN/IPSec ...................................................................................................................................................... V
15.1 VPN Overview......................................................................................................................... 15-1
15.2 IPSec Architecture ................................................................................................................... 15-2
15.3 Encapsulation........................................................................................................................... 15-3
15.4 IPSec and NAT ........................................................................................................................ 15-4
Chapter 16 VPN Screens ........................................................................................................................... 16-1
16.1 VPN/IPSec Overview .............................................................................................................. 16-1
16.2 IPSec Algorithms..................................................................................................................... 16-1
16.3 My IP Address ......................................................................................................................... 16-2
16.4 Secure Gateway Address ......................................................................................................... 16-2
16.5 VPN Summary Screen ............................................................................................................. 16-2
16.6 Keep Alive............................................................................................................................... 16-4
16.7 NAT Traversal ......................................................................................................................... 16-5
16.8 ID Type and Content ............................................................................................................... 16-6
16.9 Pre-Shared Key........................................................................................................................ 16-8
16.10 Editing VPN Policies ............................................................................................................... 16-8
16.11 IKE Phases............................................................................................................................. 16-12
16.13 Manual Key Setup ................................................................................................................. 16-17
16.15 Viewing SA Monitor ............................................................................................................. 16-20
17.2 Telnet ....................................................................................................................................... 17-2
17.3 FTP .......................................................................................................................................... 17-2
17.4 Web.......................................................................................................................................... 17-2
18.2 UPnP and ZyXEL .................................................................................................................... 18-1
Chapter 19 Logs Screens........................................................................................................................... 19-1
19.1 Logs Overview......................................................................................................................... 19-1
19.3 Displaying the Logs ................................................................................................................. 19-3
19.4 SMTP Error Messages ............................................................................................................. 19-4
viii
Table of Contents