ZyXEL Communications P-660H-Tx v2 User Manual
Page 26

List of Tables
P-660H-Tx v2 User’s Guide
26
Table 39 Firewall Rules ....................................................................................................................... 128
Table 40 Firewall: Edit Rule ................................................................................................................. 131
Table 41 Customized Services ............................................................................................................ 132
Table 42 Firewall: Configure Customized Services ............................................................................. 133
Table 43 Predefined Services .............................................................................................................. 137
Table 44 Firewall: Anti Probing ............................................................................................................ 140
Table 45 Firewall: Threshold ................................................................................................................ 142
Table 46 Content Filter: Keyword ........................................................................................................ 146
Table 47 Content Filter: Schedule ....................................................................................................... 147
Table 48 Content Filter: Trusted .......................................................................................................... 148
Table 49 Static Route ........................................................................................................................... 152
Table 50 Static Route Edit ................................................................................................................... 153
Table 51 Application and Subnet-based Bandwidth Management Example ....................................... 156
Table 52 Maximize Bandwidth Usage Example ................................................................................... 157
Table 53 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example .......................... 158
Table 54 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example ....................... 158
Table 55 Bandwidth Management Priorities ........................................................................................ 159
Table 56 Over Allotment of Bandwidth Example ................................................................................. 159
Table 57 Media Bandwidth Management: Summary ........................................................................... 160
Table 58 Bandwidth Management: Rule Setup ................................................................................... 161
Table 59 Bandwidth Management Rule Configuration ........................................................................ 162
Table 60 Services and Port Numbers .................................................................................................. 164
Table 61 Dynamic DNS ....................................................................................................................... 166
Table 62 Remote Management: WWW ............................................................................................... 171
Table 63 Remote Management: Telnet ................................................................................................ 172
Table 64 Remote Management: FTP ................................................................................................... 173
Table 65 SNMP Traps .......................................................................................................................... 175
Table 66 Remote Management: SNMP ............................................................................................... 176
Table 67 Remote Management: DNS .................................................................................................. 177
Table 68 Remote Management: ICMP ................................................................................................ 178
Table 69 TR-069 Commands ............................................................................................................... 179
Table 70 Configuring UPnP ................................................................................................................. 182
Table 71 System General Setup .......................................................................................................... 196
Table 72 System Time Setting ............................................................................................................. 198
Table 73 Firmware Upgrade ................................................................................................................ 201
Table 74 Maintenance Restore Configuration ..................................................................................... 204
Table 75 Diagnostic: General .............................................................................................................. 207
Table 76 Diagnostic: DSL Line ............................................................................................................ 208
Table 77 View Log ............................................................................................................................... 210
Table 78 Log Settings ...........................................................................................................................211
Table 79 System Maintenance Logs .................................................................................................... 213
Table 80 System Error Logs ................................................................................................................ 214
Table 81 Access Control Logs ............................................................................................................. 214