
Prestige 334W User’s Guide
Table of Contents xiii
13.3 The Firewall, NAT and Remote Management ..................................................................... 13-5
13.3.1 LAN-to-WAN rules ............................................................................................................. 13-5
13.3.2 WAN-to-LAN rules ............................................................................................................. 13-5
13.4 Configuring Content Filtering .............................................................................................. 13-6
13.5 Services.................................................................................................................................... 13-8
Remote Management and VPN/IPSec...........................................................................................................V
Chapter 14 Remote Management Screens ............................................................................................... 14-1
14.1 Remote Management Overview............................................................................................ 14-1
14.1.1 Remote Management Limitations ........................................................................................ 14-2
14.1.2 Remote Management and NAT............................................................................................ 14-2
14.1.3 System Timeout ................................................................................................................... 14-2
14.2 Configuring WWW................................................................................................................ 14-2
14.3 Configuring Telnet ................................................................................................................. 14-4
14.4 Configuring TELNET............................................................................................................ 14-4
14.5 Configuring FTP .................................................................................................................... 14-6
14.6 SNMP ...................................................................................................................................... 14-7
14.6.1 Supported MIBs ................................................................................................................... 14-9
14.6.2 SNMP Traps......................................................................................................................... 14-9
14.6.3 Configuring SNMP ............................................................................................................ 14-10
14.7 Configuring DNS...................................................................................................................14-11
14.8 Configuring Security............................................................................................................14-13
Chapter 15 Introduction to IPSec............................................................................................................. 15-1
15.1 VPN Overview ........................................................................................................................ 15-1
15.1.1 IPSec .................................................................................................................................... 15-1
15.1.2 Security Association............................................................................................................. 15-1
15.1.3 Other Terminology...............................................................................................................15-1
15.1.4 VPN Applications ................................................................................................................15-2
15.2 IPSec Architecture.................................................................................................................. 15-3
15.2.1 IPSec Algorithms ................................................................................................................. 15-3
15.2.2 Key Management ................................................................................................................. 15-4
15.3 Encapsulation ......................................................................................................................... 15-4
15.3.1 Transport Mode.................................................................................................................... 15-4
15.3.2 Tunnel Mode ........................................................................................................................ 15-4
15.4 IPSec and NAT ....................................................................................................................... 15-5
Chapter 16 VPN Screens ........................................................................................................................... 16-1
16.1 VPN/IPSec Overview ............................................................................................................. 16-1
16.2 IPSec Algorithms.................................................................................................................... 16-1
16.2.1 AH (Authentication Header) Protocol.................................................................................. 16-1
16.2.2 ESP (Encapsulating Security Payload) Protocol .................................................................. 16-2
16.3 My IP Address ........................................................................................................................ 16-2
16.4 Secure Gateway Address........................................................................................................ 16-2
Comentários a estes Manuais