Prestige 652H/HW Series User’s Guide
xvi
List of Figures
Figure 8-5 WAN Backup
..................................................................................................................................8-9
Figure 8-6 Advanced WAN Backup..............................................................................................................8-12
Figure 8-7 Advanced Modem Setup
................................................................................................................8-17
Figure 9-1 How NAT Works...........................................................................................................................9-2
Figure 9-2 NAT Application With IP Alias .....................................................................................................9-3
Figure 9-3 Multiple Servers Behind NAT Example........................................................................................9-6
Figure 9-4 NAT Mode.....................................................................................................................................9-7
Figure 9-5 Edit SUA/NAT Server Set.............................................................................................................9-8
Figure 9-6 Address Mapping Rules ..............................................................................................................9-10
Figure 9-7 Address Mapping Rule Edit ........................................................................................................9-11
Figure 10-1 DDNS........................................................................................................................................10-2
Figure 11-1 Time and Date ...........................................................................................................................11-1
Figure 12-1 Prestige Firewall Application ....................................................................................................12-3
Figure 12-2 Three-Way Handshake ..............................................................................................................12-5
Figure 12-3 SYN Flood ................................................................................................................................12-5
Figure 12-4 Smurf Attack .............................................................................................................................12-6
Figure 12-5 Stateful Inspection.....................................................................................................................12-8
Figure 13-1 LAN to WAN Traffic.................................................................................................................13-4
Figure 13-2 WAN to LAN Traffic.................................................................................................................13-5
Figure 13-3 Default Policy ...........................................................................................................................13-6
Figure 13-4 Rule Summary...........................................................................................................................13-8
Figure 13-5 Insert/Append A Firewall Rule................................................................................................13-11
Figure 13-6 Add/Edit A Custom Port..........................................................................................................13-14
Figure 13-7 Rule Summary.........................................................................................................................13-15
Figure 13-8 Rule Edit Example ..................................................................................................................13-16
Figure 13-9 Edit Custom Port Example......................................................................................................13-17
Figure 13-10 My Service Rule Configuration ............................................................................................13-18
Figure 13-11 My Service Example Rule Summary ....................................................................................13-19
Figure 13-12 Anti-Probing..........................................................................................................................13-23
Figure 13-13 Firewall Threshold ................................................................................................................13-26
Figure 14-1 Content Filter: Keyword ...........................................................................................................14-2
Figure 14-2 Content Filter: Schedule............................................................................................................14-3
Figure 14-3 Content Filter: Trusted ..............................................................................................................14-4
Figure 15-1 Encryption and Decryption .......................................................................................................15-2
Figure 15-2 IPSec Architecture.....................................................................................................................15-3
Figure 15-3 Transport and Tunnel Mode IPSec Encapsulation.....................................................................15-4
Figure 16-1 IPSec Summary Fields ..............................................................................................................16-3
Figure 16-2 VPN Summary ..........................................................................................................................16-4
Figure 16-3 NAT Router Between IPSec Routers.........................................................................................16-6
Figure 16-4 VPN Host using Intranet DNS Server Example........................................................................16-7
Figure 16-5 VPN IKE .................................................................................................................................16-10
Summary of Contents for Prestige 652H series
Page 32: ......
Page 50: ......
Page 66: ......
Page 68: ......
Page 76: ......
Page 80: ......
Page 120: ...Prestige 652H HW Series User s Guide 8 12 WAN Setup Figure 8 6 Advanced WAN Backup ...
Page 128: ......
Page 146: ......
Page 148: ......
Page 162: ......
Page 178: ...Prestige 652H HW Series User s Guide 13 16 Firewall Screens Figure 13 8 Rule Edit Example ...
Page 196: ......
Page 198: ......
Page 204: ......
Page 214: ...Prestige 652H HW Series User s Guide 16 10 VPN Screens Figure 16 5 VPN IKE ...
Page 227: ...Prestige 652H HW Series User s Guide VPN Screens 16 23 Figure 16 8 Manual Setup ...
Page 238: ......
Page 258: ......
Page 277: ...Maintenance VIII Part VIII Maintenance This part covers the maintenance screens ...
Page 278: ......
Page 296: ......
Page 298: ......
Page 308: ......
Page 324: ......
Page 330: ......
Page 386: ......
Page 406: ......
Page 418: ......
Page 428: ......
Page 450: ......
Page 454: ......
Page 464: ......
Page 470: ......
Page 486: ......
Page 494: ......
Page 500: ......
Page 512: ......
Page 516: ......
Page 520: ......
Page 560: ......
Page 574: ......