beautypg.com

ZyXEL Communications P-334W User Manual

Page 25

background image

Prestige 334W User’s Guide

List of Figures

xxv

Figure 28-10 NAT Example 1 .................................................................................................................... 28-10

Figure 28-11 Menu 4 Internet Access & NAT Example..............................................................................28-11

Figure 28-12 NAT Example 2 .....................................................................................................................28-11

Figure 28-13 Menu 15.2.1 Specifying an Inside Server............................................................................. 28-12

Figure 28-14 NAT Example 3 .................................................................................................................... 28-13

Figure 28-15 Example 3: Menu 11.3.......................................................................................................... 28-14

Figure 28-16 Example 3: Menu 15.1.1.1 ................................................................................................... 28-14

Figure 28-17 Example 3: Final Menu 15.1.1 ............................................................................................. 28-15

Figure 28-18 NAT Example 4 .................................................................................................................... 28-16

Figure 28-19 Example 4: Menu 15.1.1.1 Address Mapping Rule.............................................................. 28-17

Figure 28-20 Example 4: Menu 15.1.1 Address Mapping Rules ............................................................... 28-17

Figure 28-21 Menu 15.3 Trigger Port Setup .............................................................................................. 28-18

Figure 29-1 Menu 21.2 Firewall Setup ........................................................................................................ 29-2

Figure 30-1 Outgoing Packet Filtering Process ........................................................................................... 30-2

Figure 30-2 Filter Rule Process.................................................................................................................... 30-3

Figure 30-4 Menu 21: Filter and Firewall Setup.......................................................................................... 30-4

Figure 30-5 Menu 21.1: Filter Set Configuration......................................................................................... 30-4

Figure 30-6 Menu 21.1.1.1 TCP/IP Filter Rule............................................................................................ 30-7

Figure 30-7 Executing an IP Filter ............................................................................................................. 30-10

Figure 30-8 Menu 21.1.4.1 Generic Filter Rule ..........................................................................................30-11

Figure 30-9 Telnet Filter Example ............................................................................................................. 30-13

Figure 30-10 Example Filter: Menu 21.1.3.1............................................................................................. 30-14

Figure 30-11 Example Filter Rules Summary: Menu 21.1.3...................................................................... 30-15

Figure 30-12 Protocol and Device Filter Sets ............................................................................................ 30-16

Figure 30-13 Filtering LAN Traffic ........................................................................................................... 30-17

Figure 30-14 Filtering Remote Node Traffic ............................................................................................. 30-18

Figure 31-1 SNMP Management Model ...................................................................................................... 31-1

Figure 31-2 Menu 22 SNMP Configuration................................................................................................. 31-3

Figure 32-1 Menu 23 System Security......................................................................................................... 32-1

Figure 32-2 Menu 23 System Security......................................................................................................... 32-1

Figure 32-3 Menu 23.2 System Security : RADIUS Server ........................................................................ 32-2

Figure 32-4 Menu 23 System Security......................................................................................................... 32-3

Figure 32-5 Menu 23.4 System Security : IEEE802.1x ............................................................................... 32-4

Figure 33-1 Menu 24 System Maintenance ................................................................................................. 33-1

Figure 33-2 Menu 24.1 System Maintenance : Status.................................................................................. 33-2

Figure 33-3 Menu 24.2 System Information and Console Port Speed......................................................... 33-3

Figure 33-4 Menu 24.2.1 System Maintenance : Information ..................................................................... 33-4

Figure 33-5 Menu 24.2.2 System Maintenance : Change Console Port Speed............................................ 33-5

Figure 33-6 Menu 24.3.2 System Maintenance : Syslog Logging ............................................................... 33-5

Figure 33-7 Call-Triggering Packet Example .............................................................................................. 33-9

Figure 33-8 Menu 24.4 System Maintenance : Diagnostic ........................................................................ 33-10