ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual
Page 28
Prestige 2602HW Series User’s Guide
28
List of Figures
Figure 39 WAN Backup .......................................................................................... 116
Figure 40 How NAT Works ..................................................................................... 121
Figure 41 NAT Application With IP Alias ................................................................ 121
Figure 42 Multiple Servers Behind NAT Example .................................................. 124
Figure 43 NAT Mode .............................................................................................. 125
Figure 44 Edit SUA/NAT Server Set ...................................................................... 126
Figure 45 Address Mapping Rules ......................................................................... 127
Figure 46 Address Mapping Rule Edit ................................................................... 128
Figure 47 SIP User Agent Server ........................................................................... 133
Figure 48 SIP Proxy Server ................................................................................... 134
Figure 49 SIP Redirect Server ............................................................................... 135
Figure 50 SIP Settings ........................................................................................... 137
Figure 51 Voice Advanced Setup ........................................................................... 139
Figure 52 DiffServ: Differentiated Service Field ..................................................... 141
Figure 53 QoS ........................................................................................................ 142
Figure 54 Phone ..................................................................................................... 143
Figure 55 Speed Dial .............................................................................................. 145
Figure 56 Lifeline ................................................................................................... 147
Figure 57 Phone Port Common ............................................................................. 148
Figure 58 Dynamic DNS ........................................................................................ 150
Figure 59 Time and Date ........................................................................................ 152
Figure 60 Prestige Firewall Application .................................................................. 157
Figure 61 Three-Way Handshake .......................................................................... 159
Figure 62 SYN Flood .............................................................................................. 159
Figure 63 Smurf Attack .......................................................................................... 160
Figure 64 Stateful Inspection .................................................................................. 162
Figure 65 LAN to WAN Traffic ................................................................................ 172
Figure 66 WAN to LAN Traffic ................................................................................ 172
Figure 67 Firewall: Default Policy ........................................................................... 173
Figure 68 Firewall: Rule Summary ........................................................................ 175
Figure 69 Firewall: Edit Rule .................................................................................. 177
Figure 70 Firewall: Customized Services ............................................................... 179
Figure 71 Firewall: Configure Customized Services .............................................. 180
Figure 72 Firewall Example: Rule Summary .......................................................... 181
Figure 73 Firewall Example: Edit Rule: Destination Address ................................ 182
Figure 74 Edit Custom Port Example ..................................................................... 182
Figure 75 Firewall Example: Edit Rule: Select Customized Services .................... 183
Figure 76 Firewall Example: Rule Summary: My Service ..................................... 184
Figure 77 Firewall: Anti Probing ............................................................................. 187
Figure 78 Firewall: Threshold ................................................................................. 189
Figure 79 Content Filter: Keyword ......................................................................... 192
Figure 80 Content Filter: Schedule ........................................................................ 193
Figure 81 Content Filter: Trusted ........................................................................... 194