ZyXEL Communications Prestige 652 Series User Manual page 19

Adsl security/wireless lan router
Hide thumbs Also See for Prestige 652 Series:
Table of Contents

Advertisement

Prestige 652 Series User's Guide
Figure 6-8 RADIUS ..................................................................................................................................... 6-14
Figure 7-1 Example of Traffic Shaping.......................................................................................................... 7-3
Figure 7-2 WAN Setup................................................................................................................................... 7-4
Figure 7-3 Traffic Redirect Setup Example ................................................................................................... 7-8
Figure 7-4 Traffic Redirect LAN Setup ......................................................................................................... 7-8
Figure 7-5 WAN Backup................................................................................................................................ 7-9
Figure 7-6 Advanced WAN Backup............................................................................................................. 7-12
Figure 7-7 Advanced Modem Setup............................................................................................................. 7-17
Figure 8-1 How NAT Works .......................................................................................................................... 8-3
Figure 8-2 NAT Application With IP Alias .................................................................................................... 8-4
Figure 8-3 Multiple Servers Behind NAT Example ....................................................................................... 8-8
Figure 8-4 NAT Mode.................................................................................................................................... 8-8
Figure 8-5 Edit SUA/NAT Server Set .......................................................................................................... 8-10
Figure 8-6 Address Mapping Rules...............................................................................................................8-11
Figure 8-7 Address Mapping Rule Edit........................................................................................................ 8-13
Figure 9-1 DDNS ........................................................................................................................................... 9-2
Figure 10-1 Time/Date ................................................................................................................................. 10-1
Figure 11-1 Prestige Firewall Application ....................................................................................................11-3
Figure 11-2 Three-Way Handshake...............................................................................................................11-5
Figure 11-3 SYN Flood.................................................................................................................................11-5
Figure 11-4 Smurf Attack..............................................................................................................................11-6
Figure 11-5 Stateful Inspection .....................................................................................................................11-8
Figure 12-1 Enabling the Firewall ............................................................................................................... 12-1
Figure 12-2 Attack Alert .............................................................................................................................. 12-4
Figure 13-1 LAN to WAN Traffic................................................................................................................ 13-3
Figure 13-2 WAN to LAN Traffic................................................................................................................ 13-4
Figure 13-3 Firewall Rules Summary: First Screen..................................................................................... 13-5
List of Figures
xix

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 652Prestige 652hPrestige 652hw

Table of Contents