beautypg.com

List of figures – ZyXEL Communications 650 Series User Manual

Page 14

background image

Prestige 650 Series User’s Guide

xiv

List of Figures

List of Figures

Figure 1-1 Prestige Internet Access Application.............................................................................................1-8

Figure 1-2 Prestige LAN-to-LAN Application ...............................................................................................1-8

Figure 2-1 Password Screen ...........................................................................................................................2-1

Figure 2-2 Web Configurator SITE MAP Screen ...........................................................................................2-2

Figure 2-3 Password .......................................................................................................................................2-3

Figure 2-4 Example Xmodem Upload............................................................................................................2-5

Figure 3-1 Wizard Screen 1 ............................................................................................................................3-3

Figure 3-2 Internet Connection with PPPoA ..................................................................................................3-7

Figure 3-3 Internet Connection with RFC 1483 .............................................................................................3-9

Figure 3-4 Internet Connection with ENET ENCAP....................................................................................3-10

Figure 3-5 Internet Connection with PPPoE.................................................................................................3-11

Figure 3-6 Wizard Screen 3 ..........................................................................................................................3-13

Figure 3-7 Wizard : LAN Configuration.......................................................................................................3-14

Figure 3-8 Wizard Screen 4 ..........................................................................................................................3-15

Figure 4-1 LAN and WAN IP Addresses ........................................................................................................4-1

Figure 4-2 LAN ..............................................................................................................................................4-4

Figure 5-1 RTS/CTS .......................................................................................................................................5-2

Figure 5-2 Prestige Wireless Security Levels .................................................................................................5-3

Figure 5-3 Wireless.........................................................................................................................................5-5

Figure 5-4 MAC Address Filter ......................................................................................................................5-8

Figure 5-5 EAP Authentication.....................................................................................................................5-11

Figure 5-6 802.1x..........................................................................................................................................5-11

Figure 5-7 Local User Database ...................................................................................................................5-14

Figure 5-8 RADIUS......................................................................................................................................5-16

Figure 6-1 Example of Traffic Shaping ..........................................................................................................6-2

Figure 6-2 Internet Access Setup

.......................................................................................................................6-3

Figure 7-1 How NAT Works...........................................................................................................................7-2

Figure 7-2 NAT Application With IP Alias .....................................................................................................7-3

Figure 7-3 Multiple Servers Behind NAT Example........................................................................................7-7

Figure 7-4 NAT Mode.....................................................................................................................................7-7

Figure 7-5 Edit SUA/NAT Server Set.............................................................................................................7-9

Figure 7-6 Address Mapping Rules ..............................................................................................................7-11

Figure 7-7 Address Mapping Rule Edit ........................................................................................................7-12

Figure 8-1 DDNS............................................................................................................................................8-2

Figure 9-1 Time and Date ...............................................................................................................................9-1

Figure 10-1 Prestige Firewall Application....................................................................................................10-3

Figure 10-2 Three-Way Handshake ..............................................................................................................10-5

Figure 10-3 SYN Flood ................................................................................................................................10-5

Figure 10-4 Smurf Attack .............................................................................................................................10-6