Prestige 662HW Series User’s Guide
List of Figures
xiii
Figure 8-2 NAT Application With IP Alias .......................................................................................................... 8-3
Figure 8-3 Multiple Servers Behind NAT Example............................................................................................. 8-5
Figure 8-4 NAT Mode.......................................................................................................................................... 8-6
Figure 8-5 Edit SUA/NAT Server Set.................................................................................................................. 8-7
Figure 8-6 Address Mapping Rules ..................................................................................................................... 8-8
Figure 8-7 Address Mapping Rule Edit ............................................................................................................... 8-9
Figure 9-1 Dynamic DNS .................................................................................................................................... 9-1
Figure 10-1 Time and Date ................................................................................................................................ 10-3
Figure 11-1 Prestige Firewall Application ......................................................................................................... 11-2
Figure 11-2 Three-Way Handshake ................................................................................................................... 11-4
Figure 11-3 SYN Flood...................................................................................................................................... 11-4
Figure 11-4 Smurf Attack .................................................................................................................................. 11-5
Figure 11-5 Stateful Inspection.......................................................................................................................... 11-6
Figure 12-1 LAN to WAN Traffic...................................................................................................................... 12-3
Figure 12-2 WAN to LAN Traffic...................................................................................................................... 12-4
Figure 12-3 Firewall: Default Policy ................................................................................................................. 12-4
Figure 12-4 Firewall: Rule Summary ................................................................................................................ 12-6
Figure 12-5 Firewall: Edit Rule ......................................................................................................................... 12-8
Figure 12-6 Firewall: Customized Services..................................................................................................... 12-10
Figure 12-7 Firewall: Configure Customized Services.................................................................................... 12-11
Figure 12-8 Firewall Example: Rule Summary ............................................................................................... 12-12
Figure 12-9 Firewall Example: Edit Rule: Destination Address...................................................................... 12-12
Figure 12-10 Edit Custom Port Example ......................................................................................................... 12-13
Figure 12-11 Firewall Example: Edit Rule: Select Customized Services ........................................................ 12-14
Figure 12-12 Firewall Example: Rule Summary: My Service......................................................................... 12-15
Figure 12-13 Firewall: Anti-Probing................................................................................................................ 12-18
Figure 12-14 Firewall: Threshold .................................................................................................................... 12-20
Figure 13-1 Content Filter: Keyword................................................................................................................. 13-1
Figure 13-2 Content Filter: Schedule................................................................................................................. 13-2
Figure 13-3 Content Filter: Trusted ................................................................................................................... 13-3
Figure 14-1 Anti-virus Packet Scan Example .................................................................................................... 14-2
Figure 14-2 Anti Virus: Packet Scan.................................................................................................................. 14-3
Figure 14-3 Anti Virus: Registration and Virus Information Update ................................................................. 14-4
Figure 14-4 Virus Scan Update in Progress ....................................................................................................... 14-5
Figure 14-5 Virus Scan Update Successful ........................................................................................................ 14-6
Figure 15-1 Encryption and Decryption ............................................................................................................ 15-2
Figure 15-2 IPSec Architecture.......................................................................................................................... 15-3
Figure 15-3 Transport and Tunnel Mode IPSec Encapsulation.......................................................................... 15-3
Figure 16-1 IPSec Summary Fields ................................................................................................................... 16-3
Figure 16-2 VPN Summary ............................................................................................................................... 16-3
Figure 16-3 NAT Router Between IPSec Routers.............................................................................................. 16-5
Figure 16-4 VPN Host using Intranet DNS Server Example ............................................................................. 16-6
Содержание Prestige 662HW Series
Страница 26: ......
Страница 28: ......
Страница 36: ......
Страница 54: ......
Страница 56: ......
Страница 64: ......
Страница 84: ......
Страница 100: ......
Страница 116: ......
Страница 128: ......
Страница 150: ......
Страница 154: ......
Страница 162: ......
Страница 168: ......
Страница 194: ......
Страница 196: ......
Страница 200: ......
Страница 208: ......
Страница 214: ......
Страница 216: ......
Страница 229: ...Maintenance VIII P Pa ar rt t V VI II II I Maintenance This part covers the maintenance screens...
Страница 230: ......
Страница 242: ......
Страница 244: ......
Страница 252: ......
Страница 258: ......
Страница 262: ......
Страница 266: ......
Страница 272: ......
Страница 286: ......
Страница 290: ......
Страница 310: ......
Страница 328: ......
Страница 352: ......
Страница 358: ......
Страница 362: ......
Страница 374: ......
Страница 376: ......
Страница 394: ......
Страница 398: ......
Страница 400: ......
Страница 410: ......
Страница 444: ......
Страница 452: ......