ZyXEL Communications Prestige 662HW Series User Manual page 8

802.11g wireless adsl 2+ 4 port security gateway
Hide thumbs Also See for Prestige 662HW Series:
Table of Contents

Advertisement

Prestige 662HW Series User's Guide
12.10 Predefined Services ............................................................................................................... 12-15
12.11 Anti-Probing .......................................................................................................................... 12-17
12.12 Configuring Attack Alert ....................................................................................................... 12-18
Chapter 13 Content Filtering.................................................................................................................... 13-1
13.1 Content Filtering Overview ..................................................................................................... 13-1
13.2 Configuring Keyword Blocking .............................................................................................. 13-1
13.3 Configuring the Schedule ........................................................................................................ 13-2
13.4 Configuring Trusted Computers .............................................................................................. 13-3
Chapter 14 Anti-Virus Packet Scan ......................................................................................................... 14-1
14.1 Overview ................................................................................................................................. 14-1
14.2 Signature-Based Virus Scan .................................................................................................... 14-1
14.3 Introduction to the Prestige Anti-virus Packet Scan ................................................................ 14-2
14.4 Anti-virus Packet Scan Configuration ..................................................................................... 14-3
14.5 Registration and Online Update............................................................................................... 14-4
VPN/IPSec ...................................................................................................................................................... V
Chapter 15 Introduction to IPSec ............................................................................................................ 15-1
15.1 VPN Overview......................................................................................................................... 15-1
15.2 IPSec Architecture ................................................................................................................... 15-2
15.3 Encapsulation........................................................................................................................... 15-3
15.4 IPSec and NAT ........................................................................................................................ 15-4
Chapter 16 VPN Screens ........................................................................................................................... 16-1
16.1 VPN/IPSec Overview .............................................................................................................. 16-1
16.2 IPSec Algorithms..................................................................................................................... 16-1
16.3 My IP Address ......................................................................................................................... 16-2
16.4 Secure Gateway Address ......................................................................................................... 16-2
16.5 VPN Summary Screen ............................................................................................................. 16-2
16.6 Keep Alive............................................................................................................................... 16-4
16.7 NAT Traversal ......................................................................................................................... 16-5
16.8 ID Type and Content ............................................................................................................... 16-6
16.9 Pre-Shared Key........................................................................................................................ 16-8
16.10 Editing VPN Policies ............................................................................................................... 16-8
16.11 IKE Phases............................................................................................................................. 16-12
16.12 Configuring Advanced IKE Settings ..................................................................................... 16-14
16.13 Manual Key Setup ................................................................................................................. 16-17
16.14 Configuring Manual Key ....................................................................................................... 16-18
16.15 Viewing SA Monitor ............................................................................................................. 16-20
16.16 Configuring Global Setting.................................................................................................... 16-22
16.17 Telecommuter VPN/IPSec Examples .................................................................................... 16-22
16.18 VPN and Remote Management ............................................................................................. 16-25
Remote Management, UPnP and Logs .......................................................................................................VI
Chapter 17 Remote Management Configuration.................................................................................... 17-1
17.1 Remote Management Overview .............................................................................................. 17-1
17.2 Telnet ....................................................................................................................................... 17-2
17.3 FTP .......................................................................................................................................... 17-2
17.4 Web.......................................................................................................................................... 17-2
17.5 Configuring Remote Management........................................................................................... 17-2
Chapter 18 Universal Plug-and-Play (UPnP).......................................................................................... 18-1
18.1 Introducing Universal Plug and Play ....................................................................................... 18-1
18.2 UPnP and ZyXEL .................................................................................................................... 18-1
18.3 Installing UPnP in Windows Example .................................................................................... 18-2
18.4 Using UPnP in Windows XP Example .................................................................................... 18-4
Chapter 19 Logs Screens........................................................................................................................... 19-1
19.1 Logs Overview......................................................................................................................... 19-1
19.2 Configuring Log Settings......................................................................................................... 19-1
19.3 Displaying the Logs ................................................................................................................. 19-3
19.4 SMTP Error Messages ............................................................................................................. 19-4
viii
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents