ZyXEL Communications P-334W User Manual
Page 23

Prestige 334W User’s Guide
List of Figures
xxiii
Figure 14-7 Remote Management: DNS.................................................................................................... 14-12
Figure 14-8 Security................................................................................................................................... 14-13
Figure 15-1 Encryption and Decryption....................................................................................................... 15-2
Figure 15-2 IPSec Architecture.................................................................................................................... 15-3
Figure 15-3 Transport and Tunnel Mode IPSec Encapsulation.................................................................... 15-4
Figure 16-1 IPSec Summary Fields ............................................................................................................. 16-3
Figure 16-2 VPN: Summary ........................................................................................................................ 16-4
Figure 16-3 NAT Router Between IPSec Routers........................................................................................ 16-6
Figure 16-4 VPN Host using Intranet DNS Server Example ....................................................................... 16-7
Figure 16-5 VPN: Rule Setup (Basic).........................................................................................................16-11
Figure 16-6 Two Phases to Set Up the IPSec SA....................................................................................... 16-16
Figure 16-7 VPN IKE: Advanced .............................................................................................................. 16-19
Figure 16-8 Rule Setup: Manual ................................................................................................................ 16-27
Figure 16-9 SA Monitor............................................................................................................................. 16-31
Figure 16-10 VPN: Global Setting............................................................................................................. 16-32
Figure 16-11 Telecommuters Sharing One VPN Rule Example ................................................................ 16-34
Figure 16-12 Telecommuters Using Unique VPN Rules Example ............................................................ 16-35
Figure 17-1 View Logs................................................................................................................................. 17-1
Figure 17-2 Log Settings.............................................................................................................................. 17-3
Figure 18-1 Application-based Bandwidth Management Example.............................................................. 18-2
Figure 18-2 Subnet-based Bandwidth Management Example ..................................................................... 18-2
Figure 18-3 Application and Subnet-based Bandwidth Management Example........................................... 18-3
Figure 18-4 Bandwidth Usage Example ...................................................................................................... 18-3
Figure 18-5 Maximize Bandwidth Usage Example ..................................................................................... 18-4
Figure 18-6 Bandwidth Management Configuration ................................................................................... 18-9
Figure 18-7 Bandwidth Management Edit ..................................................................................................18-11
Figure 18-8 Bandwidth Management Monitor........................................................................................... 18-14
Figure 19-1 Maintenance Status................................................................................................................... 19-1
Figure 19-2 Maintenance System Statistics ................................................................................................. 19-3
Figure 19-3 Maintenance DHCP Table ........................................................................................................ 19-4
Figure 19-4 Maintenance Any IP ................................................................................................................. 19-5
Figure 19-5 Maintenance Association List................................................................................................... 19-6
Figure 19-6 Maintenance Firmware Upload ................................................................................................ 19-6
Figure 19-7 Upload Warning........................................................................................................................ 19-7
Figure 19-8 Network Temporarily Disconnected......................................................................................... 19-7
Figure 19-9 Upload Error Message.............................................................................................................. 19-8
Figure 19-10 Maintenance Configuration .................................................................................................... 19-9
Figure 19-11 Configuration Restore Successful......................................................................................... 19-10
Figure 19-12 Temporarily Disconnected.................................................................................................... 19-10
Figure 19-13 Configuration Restore Error ..................................................................................................19-11
Figure 19-14 Factory Defaults ....................................................................................................................19-11