Zyxel-communications Internet Security Appliance ZyWALL5UTM 4.0 Bedienungsanleitung Seite 16

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 803
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 15
ZyWALL 5/35/70 Series User’s Guide
Table of Contents 16
16.6.2 Full Path URL Checking .......................................................................286
16.6.3 File Name URL Checking .....................................................................286
Chapter 17
Content Filtering Reports .................................................................................... 290
17.1 Checking Content Filtering Activation ............................................................290
17.2 Viewing Content Filtering Reports ..................................................................290
17.3 Web Site Submission .....................................................................................295
Chapter 18
Introduction to IPSec ........................................................................................... 298
18.1 VPN Overview ................................................................................................298
18.1.1 IPSec ....................................................................................................298
18.1.2 Security Association .............................................................................298
18.1.3 Other Terminology ................................................................................298
18.1.3.1 Encryption ...................................................................................298
18.1.3.2 Data Confidentiality .....................................................................299
18.1.3.3 Data Integrity ...............................................................................299
18.1.3.4 Data Origin Authentication ..........................................................299
18.1.4 VPN Applications ..................................................................................299
18.1.4.1 Linking Two or More Private Networks Together .........................299
18.1.4.2 Accessing Network Resources When NAT Is Enabled ...............299
18.1.4.3 Unsupported IP Applications .......................................................299
18.2 IPSec Architecture .........................................................................................300
18.2.1 IPSec Algorithms ..................................................................................300
18.2.2 Key Management ..................................................................................300
18.3 Encapsulation .................................................................................................300
18.3.1 Transport Mode ....................................................................................301
18.3.2 Tunnel Mode .........................................................................................301
18.4 IPSec and NAT ...............................................................................................301
Chapter 19
VPN Screens......................................................................................................... 304
19.1 VPN/IPSec Overview .....................................................................................304
19.2 IPSec Algorithms ............................................................................................304
19.2.1 AH (Authentication Header) Protocol ....................................................304
19.2.2 ESP (Encapsulating Security Payload) Protocol ..................................304
19.3 My ZyWALL ....................................................................................................305
19.4 Remote Gateway Address .............................................................................305
19.4.1 Dynamic Remote Gateway Address .....................................................306
19.5 Nailed Up .......................................................................................................306
19.6 NAT Traversal ................................................................................................306
19.6.1 NAT Traversal Configuration .................................................................307
Seitenansicht 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 802 803

Kommentare zu diesen Handbüchern

Keine Kommentare