ZyXEL Communications Prestige 652 User Manual page 14

Zyxel adsl security router user's guide
Hide thumbs Also See for Prestige 652:
Table of Contents

Advertisement

Prestige 652 ADSL Security Router
Figure 8-11 Menu 15.2.1 - NAT Server Setup ...........................................................................................8-18
Figure 8-12 Multiple Servers Behind NAT Example....................................................................................8-19
Figure 8-13 NAT Example 1.........................................................................................................................8-20
Figure 8-14 Menu 4 - Internet Access & NAT Example ............................................................................8-21
Figure 8-15 NAT Example 2.........................................................................................................................8-22
Figure 8-16 Menu 15.2.1 - Specifying an Inside Server ............................................................................8-23
Figure 8-17 NAT Example 3.........................................................................................................................8-25
Figure 8-18 Example 3: Menu 11.3 ..............................................................................................................8-26
Figure 8-19 Example 3: Menu 15.1.1.1 ........................................................................................................8-26
Figure 8-20 Example 3: Final Menu 15.1.1 ..................................................................................................8-27
Figure 8-21 NAT Example 4.........................................................................................................................8-29
Figure 8-22 Example 4: Menu 15.1.1.1 - Address Mapping Rule..............................................................8-29
Figure 8-23 Example 4: Menu 15.1.1 - Address Mapping Rules ..............................................................8-30
Figure 9-1 Prestige Firewall Application ........................................................................................................9-3
Figure 9-2 Three-Way Handshake ..................................................................................................................9-5
Figure 9-3 SYN Flood ....................................................................................................................................9-5
Figure 9-4 Smurf Attack .................................................................................................................................9-6
Figure 9-5 Stateful Inspection.........................................................................................................................9-8
Figure 10-1 Menu 21 - Filter and Firewall Setup.......................................................................................10-1
Figure 10-2 Menu 21.2 - Firewall Setup ....................................................................................................10-2
Figure 10-3 Example Firewall Log...............................................................................................................10-2
Figure 11-1 Enabling the Firewall ................................................................................................................11-2
Figure 11-2 E-mail Screen ............................................................................................................................11-3
Figure 11-3 E-mail Log ................................................................................................................................11-6
Figure 11-4 Attack Alert ...............................................................................................................................11-8
Figure 12-1 LAN to WAN Traffic.................................................................................................................12-3
Figure 12-2 WAN to LAN Traffic.................................................................................................................12-4
List of Figures
xiv

Advertisement

Table of Contents
loading

Table of Contents