P-662H/HW-D Series User’s Guide

13.4

Configuring Trusted Computers ....................................................................

213

Chapter 14

 

 

Content Access Control ......................................................................................

215

14.1

Content Access Control Overview .................................................................

215

14.1.1 Content Access Control WLAN Application ..........................................

215

14.1.2 Configuration Steps ..............................................................................

215

14.2

Activating CAC and Creating User Groups ..................................................

216

14.2.1 Configuring Time Schedule ..................................................................

217

14.2.2 Configuring Services .............................................................................

219

 

14.2.2.1 Available Services .......................................................................

220

14.2.3 Configuring Web Site Filters .................................................................

222

14.2.4 Testing Web Site Access Privileges ......................................................

227

14.3

User Account Setup ......................................................................................

228

14.4

User Online Status ........................................................................................

229

14.5

Content Access Control Logins ......................................................................

230

14.5.1 User Login ............................................................................................

230

14.5.2 Administrator Login ...............................................................................

231

Chapter 15

 

 

Introduction to IPSec ...........................................................................................

233

15.1

VPN Overview ................................................................................................

233

15.1.1 IPSec ....................................................................................................

233

15.1.2 Security Association .............................................................................

233

15.1.3 Other Terminology ................................................................................

233

 

15.1.3.1 Encryption ...................................................................................

233

 

15.1.3.2 Data Confidentiality .....................................................................

234

 

15.1.3.3 Data Integrity ...............................................................................

234

 

15.1.3.4 Data Origin Authentication ..........................................................

234

15.1.4 VPN Applications ..................................................................................

234

15.2

IPSec Architecture .........................................................................................

235

15.2.1 IPSec Algorithms ..................................................................................

235

15.2.2 Key Management ..................................................................................

235

15.3

Encapsulation .................................................................................................

235

15.3.1 Transport Mode ....................................................................................

236

15.3.2 Tunnel Mode ........................................................................................

236

15.4

IPSec and NAT ...............................................................................................

236

Chapter 16

 

 

VPN Screens.........................................................................................................

239

16.1

VPN/IPSec Overview .....................................................................................

239

16.2

IPSec Algorithms ............................................................................................

239

16.2.1 AH (Authentication Header) Protocol ....................................................

239

Table of Contents

17