ZyWALL 5/35/70 Series User’s Guide

16.6.2 Full Path URL Checking .......................................................................

286

16.6.3 File Name URL Checking .....................................................................

286

Chapter 17

 

 

Content Filtering Reports ....................................................................................

290

17.1

Checking Content Filtering Activation ............................................................

290

17.2

Viewing Content Filtering Reports ..................................................................

290

17.3

Web Site Submission .....................................................................................

295

Chapter 18

 

 

Introduction to IPSec ...........................................................................................

298

18.1

VPN Overview ................................................................................................

298

18.1.1 IPSec ....................................................................................................

298

18.1.2 Security Association .............................................................................

298

18.1.3 Other Terminology ................................................................................

298

 

18.1.3.1 Encryption ...................................................................................

298

 

18.1.3.2 Data Confidentiality .....................................................................

299

 

18.1.3.3 Data Integrity ...............................................................................

299

 

18.1.3.4 Data Origin Authentication ..........................................................

299

18.1.4 VPN Applications ..................................................................................

299

 

18.1.4.1 Linking Two or More Private Networks Together .........................

299

 

18.1.4.2 Accessing Network Resources When NAT Is Enabled ...............

299

 

18.1.4.3 Unsupported IP Applications .......................................................

299

18.2

IPSec Architecture .........................................................................................

300

18.2.1 IPSec Algorithms ..................................................................................

300

18.2.2 Key Management ..................................................................................

300

18.3

Encapsulation .................................................................................................

300

18.3.1 Transport Mode ....................................................................................

301

18.3.2 Tunnel Mode .........................................................................................

301

18.4

IPSec and NAT ...............................................................................................

301

Chapter 19

 

 

VPN Screens.........................................................................................................

304

19.1

VPN/IPSec Overview .....................................................................................

304

19.2

IPSec Algorithms ............................................................................................

304

19.2.1 AH (Authentication Header) Protocol ....................................................

304

19.2.2 ESP (Encapsulating Security Payload) Protocol ..................................

304

19.3 My ZyWALL ....................................................................................................

305

19.4

Remote Gateway Address .............................................................................

305

19.4.1 Dynamic Remote Gateway Address .....................................................

306

19.5

Nailed Up .......................................................................................................

306

19.6

NAT Traversal ................................................................................................

306

19.6.1 NAT Traversal Configuration .................................................................

307

Table of Contents

16