ZyXEL Communications Prestige 660H Series User Manual page 24

802.11g wireless adsl2+ 4-port security gateway
Hide thumbs Also See for Prestige 660H Series:
Table of Contents

Advertisement

Prestige 660H/HW Series User's Guide
Figure 37 OTIST Start ......................................................................................................... 102
Figure 38 OTIST Process ................................................................................................... 102
Figure 39 Example of Traffic Shaping ................................................................................. 106
Figure 40 WAN Setup (PPPoE) .......................................................................................... 107
Figure 41 Traffic Redirect Example ..................................................................................... 110
Figure 42 Traffic Redirect LAN Setup ................................................................................. 110
Figure 43 WAN Backup ....................................................................................................... 111
Figure 44 How NAT Works .................................................................................................. 116
Figure 45 NAT Application With IP Alias ............................................................................. 116
Figure 46 Multiple Servers Behind NAT Example ............................................................... 119
Figure 47 NAT Mode ........................................................................................................... 120
Figure 48 Edit SUA/NAT Server Set ................................................................................... 121
Figure 49 Address Mapping Rules ...................................................................................... 122
Figure 50 Address Mapping Rule Edit ................................................................................ 123
Figure 51 Dynamic DNS ..................................................................................................... 127
Figure 52 Time and Date ..................................................................................................... 128
Figure 53 Prestige Firewall Application ............................................................................... 132
Figure 54 Three-Way Handshake ....................................................................................... 133
Figure 55 SYN Flood ........................................................................................................... 134
Figure 56 Smurf Attack ....................................................................................................... 135
Figure 57 Stateful Inspection ............................................................................................... 137
Figure 58 LAN to WAN Traffic ............................................................................................. 147
Figure 59 WAN to LAN Traffic ............................................................................................. 147
Figure 60 Firewall: Default Policy ........................................................................................ 148
Figure 61 Firewall: Rule Summary ..................................................................................... 149
Figure 62 Firewall: Edit Rule ............................................................................................... 152
Figure 63 Firewall: Customized Services ............................................................................ 154
Figure 64 Firewall: Configure Customized Services ........................................................... 155
Figure 65 Firewall Example: Rule Summary ....................................................................... 156
Figure 66 Firewall Example: Edit Rule: Destination Address ............................................. 157
Figure 67 Edit Custom Port Example .................................................................................. 157
Figure 69 Firewall Example: Rule Summary: My Service .................................................. 159
Figure 70 Firewall: Anti Probing .......................................................................................... 162
Figure 71 Firewall: Threshold .............................................................................................. 164
Figure 72 Content Filter: Keyword ...................................................................................... 166
Figure 73 Content Filter: Schedule ..................................................................................... 167
Figure 74 Content Filter: Trusted ........................................................................................ 168
Figure 75 Telnet Configuration on a TCP/IP Network ......................................................... 171
Figure 76 Remote Management ......................................................................................... 172
Figure 77 Configuring UPnP ............................................................................................... 175
23

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 660hw series

Table of Contents