P-662H/HW-D Series User’s Guide
13.4
Configuring Trusted Computers ....................................................................
213
Chapter 14
215
14.1
Content Access Control Overview .................................................................
14.1.1 Content Access Control WLAN Application ..........................................
14.1.2 Configuration Steps ..............................................................................
14.2
Activating CAC and Creating User Groups ..................................................
216
14.2.1 Configuring Time Schedule ..................................................................
217
14.2.2 Configuring Services .............................................................................
219
14.2.2.1 Available Services .......................................................................
220
14.2.3 Configuring Web Site Filters .................................................................
222
14.2.4 Testing Web Site Access Privileges ......................................................
227
14.3
User Account Setup ......................................................................................
228
14.4
User Online Status ........................................................................................
229
14.5
Content Access Control Logins ......................................................................
230
14.5.1 User Login ............................................................................................
14.5.2 Administrator Login ...............................................................................
231
Chapter 15
233
15.1
VPN Overview ................................................................................................
15.1.1 IPSec ....................................................................................................
15.1.2 Security Association .............................................................................
15.1.3 Other Terminology ................................................................................
15.1.3.1 Encryption ...................................................................................
15.1.3.2 Data Confidentiality .....................................................................
234
15.1.3.3 Data Integrity ...............................................................................
15.1.3.4 Data Origin Authentication ..........................................................
15.1.4 VPN Applications ..................................................................................
15.2
IPSec Architecture .........................................................................................
235
15.2.1 IPSec Algorithms ..................................................................................
15.2.2 Key Management ..................................................................................
15.3
Encapsulation .................................................................................................
15.3.1 Transport Mode ....................................................................................
236
15.3.2 Tunnel Mode ........................................................................................
15.4
IPSec and NAT ...............................................................................................
Chapter 16
VPN Screens.........................................................................................................
239
16.1
VPN/IPSec Overview .....................................................................................
16.2
IPSec Algorithms ............................................................................................
16.2.1 AH (Authentication Header) Protocol ....................................................
Table of Contents
17