ZyXEL Communications Prestige 662HW Series User Manual page 13

802.11g wireless adsl 2+ 4 port security gateway
Hide thumbs Also See for Prestige 662HW Series:
Table of Contents

Advertisement

Prestige 662HW Series User's Guide
Figure 8-2 NAT Application With IP Alias .......................................................................................................... 8-3
Figure 8-3 Multiple Servers Behind NAT Example............................................................................................. 8-5
Figure 8-4 NAT Mode.......................................................................................................................................... 8-6
Figure 8-5 Edit SUA/NAT Server Set.................................................................................................................. 8-7
Figure 8-6 Address Mapping Rules ..................................................................................................................... 8-8
Figure 8-7 Address Mapping Rule Edit ............................................................................................................... 8-9
Figure 9-1 Dynamic DNS .................................................................................................................................... 9-1
Figure 10-1 Time and Date ................................................................................................................................ 10-3
Figure 11-1 Prestige Firewall Application ......................................................................................................... 11-2
Figure 11-2 Three-Way Handshake ................................................................................................................... 11-4
Figure 11-3 SYN Flood...................................................................................................................................... 11-4
Figure 11-4 Smurf Attack .................................................................................................................................. 11-5
Figure 11-5 Stateful Inspection .......................................................................................................................... 11-6
Figure 12-1 LAN to WAN Traffic...................................................................................................................... 12-3
Figure 12-2 WAN to LAN Traffic...................................................................................................................... 12-4
Figure 12-3 Firewall: Default Policy ................................................................................................................. 12-4
Figure 12-4 Firewall: Rule Summary ................................................................................................................ 12-6
Figure 12-5 Firewall: Edit Rule ......................................................................................................................... 12-8
Figure 12-6 Firewall: Customized Services..................................................................................................... 12-10
Figure 12-7 Firewall: Configure Customized Services.................................................................................... 12-11
Figure 12-8 Firewall Example: Rule Summary ............................................................................................... 12-12
Figure 12-9 Firewall Example: Edit Rule: Destination Address ...................................................................... 12-12
Figure 12-10 Edit Custom Port Example ......................................................................................................... 12-13
Figure 12-11 Firewall Example: Edit Rule: Select Customized Services ........................................................ 12-14
Figure 12-12 Firewall Example: Rule Summary: My Service......................................................................... 12-15
Figure 12-13 Firewall: Anti-Probing................................................................................................................ 12-18
Figure 12-14 Firewall: Threshold .................................................................................................................... 12-20
Figure 13-1 Content Filter: Keyword................................................................................................................. 13-1
Figure 13-2 Content Filter: Schedule................................................................................................................. 13-2
Figure 13-3 Content Filter: Trusted ................................................................................................................... 13-3
Figure 14-1 Anti-virus Packet Scan Example .................................................................................................... 14-2
Figure 14-2 Anti Virus: Packet Scan.................................................................................................................. 14-3
Figure 14-3 Anti Virus: Registration and Virus Information Update ................................................................. 14-4
Figure 14-4 Virus Scan Update in Progress ....................................................................................................... 14-5
Figure 14-5 Virus Scan Update Successful ........................................................................................................ 14-6
Figure 15-1 Encryption and Decryption ............................................................................................................ 15-2
Figure 15-2 IPSec Architecture.......................................................................................................................... 15-3
Figure 15-3 Transport and Tunnel Mode IPSec Encapsulation.......................................................................... 15-3
Figure 16-1 IPSec Summary Fields ................................................................................................................... 16-3
Figure 16-2 VPN Summary ............................................................................................................................... 16-3
Figure 16-3 NAT Router Between IPSec Routers.............................................................................................. 16-5
Figure 16-4 VPN Host using Intranet DNS Server Example ............................................................................. 16-6
List of Figures
xiii

Advertisement

Table of Contents
loading

Table of Contents