Page 211 / 427 Scroll up to view Page 206 - 210
P-2602H(W)(L)-DxA Series User’s Guide
Chapter 15 Content Filtering
211
C
HAPTER
15
Content Filtering
This chapter covers how to configure content filtering.
15.1
Content Filtering Overview
Internet content filtering allows you to create and enforce Internet access policies tailored to
your needs. Content filtering gives you the ability to block web sites that contain key words
(that you specify) in the URL. You can set a schedule for when the ZyXEL Device performs
content filtering. You can also specify trusted IP addresses on the LAN for which the ZyXEL
Device will not perform content filtering.
15.2
Configuring Keyword Blocking
Use this screen to block sites containing certain keywords in the URL. For example, if you
enable the keyword "bad", the ZyXEL Device blocks all sites containing this keyword
including the URL http://www.website.com/bad.html, even if it is not included in the Filter
List.
To have your ZyXEL Device block Web sites containing keywords in their URLs, click
Security >
Content Filter
. The screen appears as shown.
Figure 114
Content Filter: Keyword
Page 212 / 427
P-2602H(W)(L)-DxA Series User’s Guide
212
Chapter 15 Content Filtering
The following table describes the labels in this screen.
15.3
Configuring the Schedule
To set the days and times for the ZyXEL Device to perform content filtering, click
Security >
Content Filter
>
Schedule
. The screen appears as shown.
Figure 115
Content Filter: Schedule
Table 76
Content Filter: Keyword
LABEL
DESCRIPTION
Active Keyword Blocking
Select this check box to enable this feature.
Block Websites that contain
these keywords in the URL:
This box contains the list of all the keywords that you have configured the
ZyXEL Device to block.
Delete
Highlight a keyword in the box and click
Delete
to remove it.
Clear All
Click
Clear All
to remove all of the keywords from the list.
Keyword
Type a keyword in this field. You may use any character (up to 127
characters). Wildcards are not allowed.
Add Keyword
Click
Add Keyword
after you have typed a keyword.
Repeat this procedure to add other keywords. Up to 64 keywords are
allowed.
When you try to access a web page containing a keyword, you will get a
message telling you that the content filter is blocking this request.
Apply
Click
Apply
to save your changes back to the ZyXEL Device.
Cancel
Click
Cancel
to return to the previously saved settings.
Page 213 / 427
P-2602H(W)(L)-DxA Series User’s Guide
Chapter 15 Content Filtering
213
The following table describes the labels in this screen.
15.4
Configuring Trusted Computers
To exclude a range of users on the LAN from content filtering on your ZyXEL Device, click
Security > Content Filter
>
Trusted
. The screen appears as shown.
Figure 116
Content Filter: Trusted
The following table describes the labels in this screen.
Table 77
Content Filter: Schedule
LABEL
DESCRIPTION
Schedule
Select
Block Everyday
to make the content filtering active everyday.
Otherwise, select
Edit Daily to Block
and configure which days of the week (or
everyday) and which time of the day you want the content filtering to be active.
Active
Select the check box to have the content filtering to be active on the selected day.
Start TIme
Enter the time when you want the content filtering to take effect in hour-minute format.
End Time
Enter the time when you want the content filtering to stop in hour-minute format.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to return to the previously saved settings.
Table 78
Content Filter: Trusted
LABEL
DESCRIPTION
Trusted User IP Range
From
Type the IP address of a computer (or the beginning IP address of a specific
range of computers) on the LAN that you want to exclude from content
filtering.
To
Type the ending IP address of a specific range of users on your LAN that
you want to exclude from content filtering. Leave this field blank if you want
to exclude an individual computer.
Apply
Click
Apply
to save your changes back to the ZyXEL Device.
Cancel
Click
Cancel
to return to the previously saved settings.
Page 214 / 427
P-2602H(W)(L)-DxA Series User’s Guide
214
Chapter 15 Content Filtering
Page 215 / 427
P-2602H(W)(L)-DxA Series User’s Guide
Chapter 16 Introduction to IPSec
215
C
HAPTER
16
Introduction to IPSec
This chapter introduces the basics of IPSec VPNs.
16.1
VPN Overview
A VPN (Virtual Private Network) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing technologies/services used to transport traffic over
the Internet or any insecure network that uses the TCP/IP protocol suite for communication.
16.1.1
IPSec
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for
secure data communications across a public network like the Internet. IPSec is built around a
number of standardized cryptographic techniques to provide confidentiality, data integrity and
authentication at the IP layer.
16.1.2
Security Association
A Security Association (SA) is a contract between two parties indicating what security
parameters, such as keys and algorithms they will use.
16.1.3
Other Terminology
16.1.3.1
Encryption
Encryption is a mathematical operation that transforms data from "plaintext" (readable) to
"ciphertext" (scrambled text) using a "key". The key and clear text are processed by the
encryption operation, which leads to the data scrambling that makes encryption secure.
Decryption is the opposite of encryption: it is a mathematical operation that transforms
“ciphertext” to plaintext. Decryption also requires a key.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top