beautypg.com

ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual

Page 28

background image

Prestige 2602HW Series User’s Guide

28

List of Figures

Figure 39 WAN Backup .......................................................................................... 116
Figure 40 How NAT Works ..................................................................................... 121
Figure 41 NAT Application With IP Alias ................................................................ 121
Figure 42 Multiple Servers Behind NAT Example .................................................. 124
Figure 43 NAT Mode .............................................................................................. 125
Figure 44 Edit SUA/NAT Server Set ...................................................................... 126
Figure 45 Address Mapping Rules ......................................................................... 127
Figure 46 Address Mapping Rule Edit ................................................................... 128
Figure 47 SIP User Agent Server ........................................................................... 133
Figure 48 SIP Proxy Server ................................................................................... 134
Figure 49 SIP Redirect Server ............................................................................... 135
Figure 50 SIP Settings ........................................................................................... 137
Figure 51 Voice Advanced Setup ........................................................................... 139
Figure 52 DiffServ: Differentiated Service Field ..................................................... 141
Figure 53 QoS ........................................................................................................ 142
Figure 54 Phone ..................................................................................................... 143
Figure 55 Speed Dial .............................................................................................. 145
Figure 56 Lifeline ................................................................................................... 147
Figure 57 Phone Port Common ............................................................................. 148
Figure 58 Dynamic DNS ........................................................................................ 150
Figure 59 Time and Date ........................................................................................ 152
Figure 60 Prestige Firewall Application .................................................................. 157
Figure 61 Three-Way Handshake .......................................................................... 159
Figure 62 SYN Flood .............................................................................................. 159
Figure 63 Smurf Attack .......................................................................................... 160
Figure 64 Stateful Inspection .................................................................................. 162
Figure 65 LAN to WAN Traffic ................................................................................ 172
Figure 66 WAN to LAN Traffic ................................................................................ 172
Figure 67 Firewall: Default Policy ........................................................................... 173
Figure 68 Firewall: Rule Summary ........................................................................ 175
Figure 69 Firewall: Edit Rule .................................................................................. 177
Figure 70 Firewall: Customized Services ............................................................... 179
Figure 71 Firewall: Configure Customized Services .............................................. 180
Figure 72 Firewall Example: Rule Summary .......................................................... 181
Figure 73 Firewall Example: Edit Rule: Destination Address ................................ 182
Figure 74 Edit Custom Port Example ..................................................................... 182
Figure 75 Firewall Example: Edit Rule: Select Customized Services .................... 183
Figure 76 Firewall Example: Rule Summary: My Service ..................................... 184
Figure 77 Firewall: Anti Probing ............................................................................. 187
Figure 78 Firewall: Threshold ................................................................................. 189
Figure 79 Content Filter: Keyword ......................................................................... 192
Figure 80 Content Filter: Schedule ........................................................................ 193
Figure 81 Content Filter: Trusted ........................................................................... 194