beautypg.com

ZyXEL Communications P-334W User Manual

Page 23

background image

Prestige 334W User’s Guide

List of Figures

xxiii

Figure 14-7 Remote Management: DNS.................................................................................................... 14-12

Figure 14-8 Security................................................................................................................................... 14-13

Figure 15-1 Encryption and Decryption....................................................................................................... 15-2

Figure 15-2 IPSec Architecture.................................................................................................................... 15-3

Figure 15-3 Transport and Tunnel Mode IPSec Encapsulation.................................................................... 15-4

Figure 16-1 IPSec Summary Fields ............................................................................................................. 16-3

Figure 16-2 VPN: Summary ........................................................................................................................ 16-4

Figure 16-3 NAT Router Between IPSec Routers........................................................................................ 16-6

Figure 16-4 VPN Host using Intranet DNS Server Example ....................................................................... 16-7

Figure 16-5 VPN: Rule Setup (Basic).........................................................................................................16-11

Figure 16-6 Two Phases to Set Up the IPSec SA....................................................................................... 16-16

Figure 16-7 VPN IKE: Advanced .............................................................................................................. 16-19

Figure 16-8 Rule Setup: Manual ................................................................................................................ 16-27

Figure 16-9 SA Monitor............................................................................................................................. 16-31

Figure 16-10 VPN: Global Setting............................................................................................................. 16-32

Figure 16-11 Telecommuters Sharing One VPN Rule Example ................................................................ 16-34

Figure 16-12 Telecommuters Using Unique VPN Rules Example ............................................................ 16-35

Figure 17-1 View Logs................................................................................................................................. 17-1

Figure 17-2 Log Settings.............................................................................................................................. 17-3

Figure 18-1 Application-based Bandwidth Management Example.............................................................. 18-2

Figure 18-2 Subnet-based Bandwidth Management Example ..................................................................... 18-2

Figure 18-3 Application and Subnet-based Bandwidth Management Example........................................... 18-3

Figure 18-4 Bandwidth Usage Example ...................................................................................................... 18-3

Figure 18-5 Maximize Bandwidth Usage Example ..................................................................................... 18-4

Figure 18-6 Bandwidth Management Configuration ................................................................................... 18-9

Figure 18-7 Bandwidth Management Edit ..................................................................................................18-11

Figure 18-8 Bandwidth Management Monitor........................................................................................... 18-14

Figure 19-1 Maintenance Status................................................................................................................... 19-1

Figure 19-2 Maintenance System Statistics ................................................................................................. 19-3

Figure 19-3 Maintenance DHCP Table ........................................................................................................ 19-4

Figure 19-4 Maintenance Any IP ................................................................................................................. 19-5

Figure 19-5 Maintenance Association List................................................................................................... 19-6

Figure 19-6 Maintenance Firmware Upload ................................................................................................ 19-6

Figure 19-7 Upload Warning........................................................................................................................ 19-7

Figure 19-8 Network Temporarily Disconnected......................................................................................... 19-7

Figure 19-9 Upload Error Message.............................................................................................................. 19-8

Figure 19-10 Maintenance Configuration .................................................................................................... 19-9

Figure 19-11 Configuration Restore Successful......................................................................................... 19-10

Figure 19-12 Temporarily Disconnected.................................................................................................... 19-10

Figure 19-13 Configuration Restore Error ..................................................................................................19-11

Figure 19-14 Factory Defaults ....................................................................................................................19-11