Table of Contents
Content Filtering ................................................................................................................... 191
Chapter 13
Content Access Control ....................................................................................................... 195
13.3 User Account Setup ........................................................................................................ 206
13.4 User Online Status .......................................................................................................... 207
13.5 Trusted Devices .............................................................................................................. 208
13.7.1 User Login .............................................................................................................. 209
Register.................................................................................................................................. 211
14.1 myZyXEL.com overview ...................................................................................................211
14.2 Registration ..................................................................................................................... 212
14.3 Service ............................................................................................................................. 213
Introduction to IPSec............................................................................................................ 215
15.1 VPN Overview ................................................................................................................. 215
15.1.1 IPSec ...................................................................................................................... 215
15.1.3 Other Terminology .................................................................................................. 215
15.1.4 VPN Applications ................................................................................................... 216
15.2 IPSec Architecture ........................................................................................................... 216
15.2.1 IPSec Algorithms .................................................................................................... 217
15.2.2 Key Management ................................................................................................... 217
15.3 Encapsulation .................................................................................................................. 217
16
P-662H/HW-D Series User's Guide