ZyXEL Communications P-2602HWLNI User Manual page 18

P-2602hwlni series 802.11g wireless adsl2+ 4-port voip iad
Table of Contents

Advertisement

Table of Contents
15.4.1 LAN to WAN Rules ................................................................................................. 248
15.4.2 Alerts ...................................................................................................................... 248
15.5 General Firewall Policy ................................................................................................... 248
15.6 Firewall Rules Summary ................................................................................................. 249
15.6.1 Configuring Firewall Rules ................................................................................... 251
15.6.2 Customized Services ............................................................................................ 254
15.6.3 Configuring a Customized Service ....................................................................... 254
15.7 Example Firewall Rule ..................................................................................................... 255
15.8 DoS Thresholds .............................................................................................................. 259
15.8.1 Threshold Values ................................................................................................... 259
15.8.2 Half-Open Sessions ............................................................................................... 260
15.8.3 Configuring Firewall Thresholds ............................................................................. 260
15.9 Firewall Commands ......................................................................................................... 262
Content Filtering ................................................................................................................... 265
16.1 Content Filtering Overview ............................................................................................. 265
16.2 Configuring Keyword Blocking ........................................................................................ 265
16.3 Configuring the Schedule .............................................................................................. 266
16.4 Configuring Trusted Computers ..................................................................................... 267
Introduction to IPSec............................................................................................................ 269
17.1 VPN Overview ............................................................................................................... 269
17.1.1 IPSec ...................................................................................................................... 269
17.1.2 Security Association ............................................................................................... 269
17.1.3 Other Terminology .................................................................................................. 269
17.1.4 VPN Applications ................................................................................................... 270
17.2 IPSec Architecture ........................................................................................................... 270
17.2.1 IPSec Algorithms .................................................................................................... 271
17.2.2 Key Management ................................................................................................... 271
17.3 Encapsulation .................................................................................................................. 271
17.3.1 Transport Mode ...................................................................................................... 272
17.3.2 Tunnel Mode ......................................................................................................... 272
17.4 IPSec and NAT ................................................................................................................ 272
VPN Screens.......................................................................................................................... 275
18.1 VPN/IPSec Overview ....................................................................................................... 275
18.2 IPSec Algorithms ............................................................................................................. 275
18.2.1 AH (Authentication Header) Protocol ..................................................................... 275
18.2.2 ESP (Encapsulating Security Payload) Protocol .................................................... 275
18.3 My IP Address ................................................................................................................. 276
18
P-2602HWLNI User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-2602hwlni-d3aP-2602hwlni-d7a

Table of Contents