ZyXEL Communications P-662H Network Router User Manual


 
P-662H/HW-D Series User’s Guide
Table of Contents 17
13.4 Configuring Trusted Computers ....................................................................213
Chapter 14
Content Access Control ...................................................................................... 215
14.1 Content Access Control Overview .................................................................215
14.1.1 Content Access Control WLAN Application ..........................................215
14.1.2 Configuration Steps ..............................................................................215
14.2 Activating CAC and Creating User Groups ..................................................216
14.2.1 Configuring Time Schedule ..................................................................217
14.2.2 Configuring Services .............................................................................219
14.2.2.1 Available Services .......................................................................220
14.2.3 Configuring Web Site Filters .................................................................222
14.2.4 Testing Web Site Access Privileges ......................................................227
14.3 User Account Setup ......................................................................................228
14.4 User Online Status ........................................................................................229
14.5 Content Access Control Logins ......................................................................230
14.5.1 User Login ............................................................................................230
14.5.2 Administrator Login ...............................................................................231
Chapter 15
Introduction to IPSec ........................................................................................... 233
15.1 VPN Overview ................................................................................................233
15.1.1 IPSec ....................................................................................................233
15.1.2 Security Association .............................................................................233
15.1.3 Other Terminology ................................................................................233
15.1.3.1 Encryption ...................................................................................233
15.1.3.2 Data Confidentiality .....................................................................234
15.1.3.3 Data Integrity ...............................................................................234
15.1.3.4 Data Origin Authentication ..........................................................234
15.1.4 VPN Applications ..................................................................................234
15.2 IPSec Architecture .........................................................................................235
15.2.1 IPSec Algorithms ..................................................................................235
15.2.2 Key Management ..................................................................................235
15.3 Encapsulation .................................................................................................235
15.3.1 Transport Mode ....................................................................................236
15.3.2 Tunnel Mode ........................................................................................236
15.4 IPSec and NAT ...............................................................................................236
Chapter 16
VPN Screens......................................................................................................... 239
16.1 VPN/IPSec Overview .....................................................................................239
16.2 IPSec Algorithms ............................................................................................239
16.2.1 AH (Authentication Header) Protocol ....................................................239