Prestige 650 Series User's Guide
Figure 11-2 E-mail ........................................................................................................................................11-2
Figure 11-3 Alert ...........................................................................................................................................11-6
Figure 12-3 Firewall Logs............................................................................................................................ 12-5
Figure 12-7 Timeout................................................................................................................................... 12-15
Figure 13-3 Edit Rule Example.................................................................................................................... 13-3
Figure 15-2 VPN Application ...................................................................................................................... 15-3
Figure 15-3 IPSec Architecture.................................................................................................................... 15-4
Figure 16-2 VPN Summary ......................................................................................................................... 16-4
Figure 16-3 VPN IKE .................................................................................................................................. 16-8
Figure 16-5 VPN IKE: Advanced .............................................................................................................. 16-16
Figure 16-6 VPN Manual Key ................................................................................................................... 16-20
Figure 16-7 SA Monitor............................................................................................................................. 16-25
Figure 16-8 Global Setting......................................................................................................................... 16-26
Figure 16-9 VPN Logs ............................................................................................................................... 16-27
Figure 17-2 Remote Management................................................................................................................ 17-3
Figure 18-1 Configuring UPnP .................................................................................................................... 18-2
Figure 19-1 Log Settings.............................................................................................................................. 19-2
List of Figures
xv