Table of Contents
P-662H/HW-D Series User’s Guide
16
Chapter
12
Content Filtering
...................................................................................................................
191
12.1 Content Filtering Overview
.............................................................................................
191
12.2 Configuring Keyword Blocking
........................................................................................
191
12.3 Configuring the Schedule
...............................................................................................
192
12.4 Configuring Trusted Computers
......................................................................................
193
Chapter
13
Content Access Control
.......................................................................................................
195
13.1 Content Access Control Overview
...................................................................................
195
13.1.1 Content Access Control WLAN Application
...........................................................
195
13.1.2 Configuration Steps
................................................................................................
195
13.2 Activating CAC and Creating
User Groups
....................................................................
196
13.2.1 Configuring Time Schedule
...................................................................................
197
13.2.2 Configuring Services
.............................................................................................
198
13.2.3 Configuring Web Site Filters
.................................................................................
200
13.2.4 Testing Web Site Access Privileges
......................................................................
205
13.3 User Account Setup
........................................................................................................
206
13.4 User Online Status
..........................................................................................................
207
13.5 Trusted Devices
..............................................................................................................
208
13.6 Trusted-external Websites
..............................................................................................
208
13.7 Content Access Control Logins
.......................................................................................
209
13.7.1 User Login
..............................................................................................................
209
13.7.2 Administrator Login
................................................................................................
210
Chapter
14
Register
..................................................................................................................................
211
14.1 myZyXEL.com overview
...................................................................................................
211
14.1.1 Subscription Services Available on the ZyXEL Device
...........................................
211
14.2 Registration
.....................................................................................................................
212
14.3 Service
.............................................................................................................................
213
Chapter
15
Introduction to IPSec
............................................................................................................
215
15.1 VPN Overview
.................................................................................................................
215
15.1.1 IPSec
......................................................................................................................
215
15.1.2 Security Association
...............................................................................................
215
15.1.3 Other Terminology
..................................................................................................
215
15.1.4 VPN Applications
...................................................................................................
216
15.2 IPSec Architecture
...........................................................................................................
216
15.2.1 IPSec Algorithms
....................................................................................................
217
15.2.2 Key Management
...................................................................................................
217
15.3 Encapsulation
..................................................................................................................
217