beautypg.com

ZyXEL Communications P-2608HWL-Dx Series User Manual

Page 27

background image

P-2608HWL-Dx Series User’s Guide

List of Figures

27

Figure 82 Edit Address Mapping Rule .................................................................. 148
Figure 83 Network > NAT > ALG ........................................................................... 150
Figure 84 SIP User Agent ...................................................................................... 153
Figure 85 SIP Proxy Server ................................................................................... 153
Figure 86 SIP Redirect Server ............................................................................... 154
Figure 87 STUN ..................................................................................................... 156
Figure 88 DiffServ: Differentiated Service Field ..................................................... 158
Figure 89 VoIP > SIP > SIP Settings ...................................................................... 160
Figure 90 VoIP > SIP > SIP Settings > Advanced .................................................. 162
Figure 91 VoIP > SIP > QoS .................................................................................. 165
Figure 92 VoIP > Phone > Analog Phone .............................................................. 172
Figure 93 VoIP > Phone > Analog Phone > Advanced .......................................... 173
Figure 94 VoIP > Phone > Common ...................................................................... 174
Figure 95 VoIP > Phone > Region ......................................................................... 175
Figure 96 Phone Book > Speed Dial ...................................................................... 178
Figure 97 Phone Book > Incoming Call Policy ....................................................... 180
Figure 98 Phone Book > Group Ring ..................................................................... 182
Figure 99 VoIP > PSTN Line > General ................................................................. 186
Figure 100 Firewall Application .............................................................................. 189
Figure 101 Three-Way Handshake ........................................................................ 190
Figure 102 SYN Flood ............................................................................................ 191
Figure 103 Smurf Attack ........................................................................................ 192
Figure 104 Stateful Inspection ................................................................................ 193
Figure 105 Firewall: General .................................................................................. 202
Figure 106 Firewall Rules ..................................................................................... 204
Figure 107 Firewall: Edit Rule ................................................................................ 206
Figure 108 Firewall: Customized Services ............................................................. 208
Figure 109 Firewall: Configure Customized Services ............................................ 209
Figure 110 Firewall Example: Rules ....................................................................... 210
Figure 111 Edit Custom Port Example ................................................................... 210
Figure 112 Firewall Example: Edit Rule: Destination Address .............................. 211
Figure 113 Firewall Example: Edit Rule: Select Customized Services ................... 212
Figure 114 Firewall Example: Rules: MyService ................................................... 213
Figure 115 Firewall: Threshold ............................................................................... 215
Figure 116 Content Filter: Keyword ........................................................................ 217
Figure 117 Content Filter: Schedule ....................................................................... 218
Figure 118 Content Filter: Trusted .......................................................................... 219
Figure 119 VPN: Example ...................................................................................... 221
Figure 120 VPN: IKE SA and IPSec SA ................................................................ 222
Figure 121 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal .......... 223
Figure 122 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ........ 223
Figure 123 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication .............. 224
Figure 124 VPN/NAT Example ............................................................................... 227