ZyXEL Communications Prestige 2602R Series User Manual page 26

Adsl voip iad
Hide thumbs Also See for Prestige 2602R Series:
Table of Contents

Advertisement

Prestige 2602R Series User's Guide
Figure 38 SIP User Agent ...................................................................................... 105
Figure 39 SIP Proxy Server ................................................................................... 105
Figure 40 SIP Redirect Server ............................................................................... 106
Figure 41 SIP Settings ........................................................................................... 109
Figure 42 Voice Advanced Setup ........................................................................... 111
Figure 43 DiffServ: Differentiated Service Field ..................................................... 113
Figure 44 QoS ........................................................................................................ 114
Figure 45 Phone ..................................................................................................... 116
Figure 46 Speed Dial .............................................................................................. 118
Figure 47 Phone Port Common ............................................................................. 123
Figure 48 Voice Call Forward ................................................................................. 125
Figure 49 Dynamic DNS ........................................................................................ 130
Figure 50 Time and Date ........................................................................................ 132
Figure 51 Prestige Firewall Application .................................................................. 137
Figure 52 Three-Way Handshake .......................................................................... 138
Figure 53 SYN Flood .............................................................................................. 139
Figure 54 Smurf Attack .......................................................................................... 140
Figure 55 Stateful Inspection .................................................................................. 142
Figure 56 LAN to WAN Traffic ................................................................................ 152
Figure 57 WAN to LAN Traffic ................................................................................ 152
Figure 58 Firewall: Default Policy ........................................................................... 153
Figure 59 Firewall: Rule Summary ........................................................................ 154
Figure 60 Firewall: Edit Rule .................................................................................. 156
Figure 61 Firewall: Customized Services ............................................................... 158
Figure 62 Firewall: Configure Customized Services .............................................. 159
Figure 63 Firewall Example: Rule Summary .......................................................... 160
Figure 65 Edit Custom Port Example ..................................................................... 161
Figure 67 Firewall Example: Rule Summary: My Service ..................................... 163
Figure 68 Firewall: Anti Probing ............................................................................. 166
Figure 69 Firewall: Threshold ................................................................................. 168
Figure 70 Content Filter: Keyword ......................................................................... 172
Figure 71 Content Filter: Schedule ........................................................................ 173
Figure 72 Content Filter: Trusted ........................................................................... 174
Figure 73 Telnet Configuration on a TCP/IP Network ............................................ 176
Figure 74 Remote Management ............................................................................ 177
Figure 75 Configuring UPnP .................................................................................. 180
Figure 78 Network Connections ............................................................................. 183
26
182
List of Figures

Advertisement

Table of Contents
loading

Table of Contents