Prestige 652H/HW Series User's Guide
..................................................................................................................................8-9
................................................................................................................8-17
Figure 9-1 How NAT Works...........................................................................................................................9-2
Figure 9-4 NAT Mode.....................................................................................................................................9-7
Figure 10-1 DDNS........................................................................................................................................10-2
Figure 11-1 Time and Date ...........................................................................................................................11-1
Figure 12-3 SYN Flood ................................................................................................................................12-5
Figure 12-4 Smurf Attack .............................................................................................................................12-6
Figure 13-3 Default Policy ...........................................................................................................................13-6
Figure 13-4 Rule Summary...........................................................................................................................13-8
Figure 13-7 Rule Summary.........................................................................................................................13-15
Figure 13-8 Rule Edit Example ..................................................................................................................13-16
Figure 13-12 Anti-Probing..........................................................................................................................13-23
Figure 15-2 IPSec Architecture.....................................................................................................................15-3
Figure 16-2 VPN Summary ..........................................................................................................................16-4
Figure 16-5 VPN IKE .................................................................................................................................16-10
xvi
List of Figures