ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series Guide de l'utilisateur Page 15

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 519
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 14
Prestige 2602HW Series User’s Guide
Table of Contents 15
14.4.2 WAN to LAN Rules ...............................................................................172
14.4.3 Alerts .....................................................................................................173
14.5 Configuring Basic Firewall Settings ................................................................173
14.6 Rule Summary ...............................................................................................174
14.6.1 Configuring Firewall Rules ....................................................................176
14.7 Customized Services .....................................................................................179
14.8 Creating/Editing A Customized Service .........................................................179
14.9 Example Firewall Rule ...................................................................................180
14.10 Predefined Services .....................................................................................184
14.11 Anti-Probing ..................................................................................................186
14.12 DOS Thresholds ...........................................................................................187
14.12.1 Threshold Values ................................................................................188
14.12.2 Half-Open Sessions ............................................................................188
14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................188
Chapter 15
Content Filtering .................................................................................................. 191
15.1 Content Filtering Overview .............................................................................191
15.2 Configuring Keyword Blocking .......................................................................191
15.3 Configuring the Schedule ..............................................................................192
15.4 Configuring Trusted Computers .....................................................................193
Chapter 16
Introduction to IPSec ........................................................................................... 195
16.1 VPN Overview ................................................................................................195
16.1.1 IPSec ....................................................................................................195
16.1.2 Security Association .............................................................................195
16.1.3 Other Terminology ................................................................................195
16.1.3.1 Encryption ...................................................................................195
16.1.3.2 Data Confidentiality .....................................................................196
16.1.3.3 Data Integrity ...............................................................................196
16.1.3.4 Data Origin Authentication ..........................................................196
16.1.4 VPN Applications ..................................................................................196
16.2 IPSec Architecture .........................................................................................197
16.2.1 IPSec Algorithms ..................................................................................197
16.2.2 Key Management ..................................................................................197
16.3 Encapsulation .................................................................................................197
16.3.1 Transport Mode ....................................................................................198
16.3.2 Tunnel Mode ........................................................................................198
16.4 IPSec and NAT ...............................................................................................198
Vue de la page 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 518 519

Commentaires sur ces manuels

Pas de commentaire