Prestige 662H/HW Series User’s Guide
Chapter 17
Anti-Virus Packet Scan........................................................................................
204
17.1
Overview ........................................................................................................
17.1.1 Types of Computer Viruses ..................................................................
17.2
Signature-Based Virus Scan ..........................................................................
17.2.1 Computer Virus Infection and Prevention .............................................
205
17.3
Introduction to the Prestige Anti-virus Packet Scan .......................................
17.3.1 How the Prestige Virus Scan Works ....................................................
206
17.3.2 Limitations of the Prestige Packet Scan ...............................................
17.4
Anti-virus Packet Scan Configuration .............................................................
207
17.5
Registration and Online Update .....................................................................
208
17.5.1 Updating the Anti Virus Packet Scan ....................................................
210
Chapter 18
212
18.1
VPN Overview ................................................................................................
18.1.1 IPSec ....................................................................................................
18.1.2 Security Association .............................................................................
18.1.3 Other Terminology ................................................................................
18.1.3.1 Encryption ...................................................................................
18.1.3.2 Data Confidentiality .....................................................................
213
18.1.3.3 Data Integrity ...............................................................................
18.1.3.4 Data Origin Authentication ..........................................................
18.1.4 VPN Applications ..................................................................................
18.2
IPSec Architecture .........................................................................................
18.2.1 IPSec Algorithms ..................................................................................
214
18.2.2 Key Management ..................................................................................
18.3
Encapsulation .................................................................................................
18.3.1 Transport Mode ....................................................................................
215
18.3.2 Tunnel Mode ........................................................................................
18.4
IPSec and NAT ...............................................................................................
Chapter 19
VPN Screens.........................................................................................................
218
19.1
VPN/IPSec Overview .....................................................................................
19.2
IPSec Algorithms ............................................................................................
19.2.1 AH (Authentication Header) Protocol ...................................................
19.2.2 ESP (Encapsulating Security Payload) Protocol .................................
19.3
My IP Address ................................................................................................
219
19.4
Secure Gateway Address ..............................................................................
220
19.4.1 Dynamic Secure Gateway Address ......................................................
19.5 VPN Summary Screen ...................................................................................
19.6
Keep Alive ......................................................................................................
222
14