beautypg.com

ZyXEL Communications Prestige 480 User Manual

Page 21

background image

Prestige 480 Dual BRI ISDN Router

List of Figures

xxi

Figure 8-9 Edit Dial-in-User for RAS........................................................................................................................ 8-11

Figure 8-10 LAN 1 LAN-to-LAN Application ........................................................................................................ 8-13

Figure 8-11 LAN2 LAN-to-LAN Application ......................................................................................................... 8-13

Figure 8-12 Testing Callback with your Connection............................................................................................... 8-14

Figure 8-13 Callback with CLID Configuration...................................................................................................... 8-15

Figure 8-14 Configuring CLID with Callback ......................................................................................................... 8-16

Figure 8-15 Callback and CLID Connection Test.................................................................................................. 8-17

Figure 8-16 Multiple Server Configuration .............................................................................................................. 8-18

Figure 9-1 Filter Rule Process....................................................................................................................................... 9-2

Figure 9-2 Menu 21 - Filter Set Configuration .......................................................................................................... 9-3

Figure 9-3 Menu 21.1 - Filter Rules Summary .......................................................................................................... 9-4

Figure 9-4 Menu 21.2 - Filter Rules Summary .......................................................................................................... 9-4

Figure 9-5 Protocol and Device Filter Sets ................................................................................................................. 9-7

Figure 9-6 Menu 21.1.1 - TCP/IP Filter Rule ............................................................................................................. 9-8

Figure 9-7 Executing a Filter Rule ............................................................................................................................. 9-11

Figure 9-8 Menu 21.3.1 - Generic Filter Rule .......................................................................................................... 9-12

Figure 9-9 Menu 21.1.3 - IPX Filter Rule ................................................................................................................. 9-14

Figure 9-10 Filtering Ethernet traffic ......................................................................................................................... 9-16

Figure 9-11 Filtering Remote Node traffic............................................................................................................... 9-17

Figure 9-12 Default Dial-in Filter............................................................................................................................... 9-17

Figure 10-1 Menu 22 - SNMP Configuration........................................................................................................... 10-2

Figure 11-1 Menu 23 - System Security .................................................................................................................... 11-1

Figure 11-2 Menu 23.1 - System Security - Change Password ............................................................................. 11-2

Figure 11-3 Menu 23.2 - System Security - External Server................................................................................. 11-5

Figure 11-4 Menu 24.3.3 – System Maintenance – Accounting Server............................................................... 11-7

Figure 11-5 Examples of RADIUS Accounting Message ...................................................................................... 11-8

Figure 12-1 Telnet Configuration on a TCP/IP Network........................................................................................ 12-2