
Prestige 652 Series User’s Guide
xx
List of Figures
Figure 13-4 Creating/Editing A Firewall Rule............................................................................................13-10
Figure 13-5 Adding/Editing Source and Destination Addresses.................................................................13-12
Figure 13-6 Timeout ...................................................................................................................................13-13
Figure 14-1 Customized Services .................................................................................................................14-1
Figure 14-2 Creating/Editing A Customized Service....................................................................................14-2
Figure 14-3 Configure Source IP Example...................................................................................................14-4
Figure 14-4 Customized Service for MyService Example............................................................................14-4
Figure 14-5 Syslog Rule Configuration Example.........................................................................................14-5
Figure 14-6 Rule Summary Example ...........................................................................................................14-6
Figure 15-1 Content Filter: Keyword ...........................................................................................................15-2
Figure 15-2 Content Filter: Schedule............................................................................................................15-3
Figure 15-3 Content Filter: Trusted ..............................................................................................................15-4
Figure 16-1 Encryption and Decryption .......................................................................................................16-2
Figure 16-2 VPN Application .......................................................................................................................16-3
Figure 16-3 IPSec Architecture.....................................................................................................................16-4
Figure 16-4 Transport and Tunnel Mode IPSec Encapsulation.....................................................................16-5
Figure 17-1 IPSec Summary Fields ..............................................................................................................17-3
Figure 17-2 VPN Summary ..........................................................................................................................17-4
Figure 17-3 VPN IKE ...................................................................................................................................17-8
Figure 17-4 Two Phases to Set Up the IPSec SA........................................................................................17-13
Figure 17-5 VPN IKE: Advanced ...............................................................................................................17-15
Figure 17-6 Manual Setup ..........................................................................................................................17-19
Figure 17-7 SA Monitor..............................................................................................................................17-23
Figure 17-8 Global Setting .........................................................................................................................17-24
Figure 17-9 Telecommuters Sharing One VPN Rule Example...................................................................17-26
Figure 17-10 Telecommuters Using Unique VPN Rules Example .............................................................17-27
Figure 18-1 Telnet Configuration on a TCP/IP Network ..............................................................................18-2
Содержание Prestige 652
Страница 1: ...Prestige 652 Series ADSL Security Wireless LAN Router User s Guide Version 3 40 August 2003...
Страница 48: ...Prestige 652 Series User s Guide 1 10 Getting To Know Your Prestige Figure 1 4 Prestige LAN to LAN Application...
Страница 92: ......
Страница 104: ...Prestige 652 Series User s Guide 7 12 WAN Setup Figure 7 6 Advanced WAN Backup...
Страница 112: ......
Страница 133: ......
Страница 147: ......
Страница 178: ...VPN IPSec V Part V VPN IPSec This part provides information about configuring VPN IPSec for secure communications...
Страница 192: ...Prestige 652 Series User s Guide 17 8 VPN Screens Figure 17 3 VPN IKE...
Страница 232: ......
Страница 252: ...Maintenance VIII Part VIII Maintenance This part covers the maintenance screens...
Страница 254: ...Prestige 652 Series User s Guide 22 2 Maintenance Figure 22 1 System Status...
Страница 268: ......
Страница 278: ......
Страница 294: ......
Страница 310: ......
Страница 352: ......
Страница 414: ......
Страница 418: ......
Страница 428: ......
Страница 433: ...XII Part XII Appendices and Index This part contains additional background information and an index or key terms...
Страница 434: ......
Страница 440: ......
Страница 451: ...Prestige 652 Series User s Guide Wireless LAN and IEEE 802 11 C 3 Diagram C 2 ESS Provides Campus Wide Coverage...
Страница 452: ......
Страница 456: ......
Страница 496: ......
Страница 510: ......