ZyXEL Communications P-2602HW(L) Series User Manual

Page 25

Advertising
background image

P-2602H(W)(L)-DxA Series User’s Guide

List of Figures

25

Figure 82 Port Forwarding Rule Setup .............................................................................. 148
Figure 83 Network > NAT > ALG ........................................................................................ 149
Figure 84 SIP User Agent ................................................................................................... 153
Figure 85 SIP Proxy Server ................................................................................................ 153
Figure 86 SIP Redirect Server ............................................................................................ 154
Figure 87 SIP > SIP Settings .............................................................................................. 155
Figure 88 VoIP > SIP Settings > Advanced ........................................................................ 159
Figure 89 DiffServ: Differentiated Service Field .................................................................. 162
Figure 90 SIP > QoS ........................................................................................................... 163
Figure 91 Phone > Analog Phone ....................................................................................... 165
Figure 92 Phone > Analog Phone > Advanced ................................................................... 166
Figure 93 Phone > Common ............................................................................................... 167
Figure 94 VoIP > Phone > Region ...................................................................................... 172
Figure 95 Phone Book > Speed Dial ................................................................................... 173
Figure 96 Phone Book > Incoming Call Policy .................................................................... 175
Figure 97 PSTN Line > General .......................................................................................... 177
Figure 98 Firewall Application ............................................................................................. 183
Figure 99 Three-Way Handshake ....................................................................................... 184
Figure 100 SYN Flood ......................................................................................................... 185
Figure 101 Smurf Attack ..................................................................................................... 186
Figure 102 Stateful Inspection ............................................................................................. 187
Figure 103 Firewall: General ............................................................................................... 196
Figure 104 Firewall Rules .................................................................................................. 198
Figure 105 Firewall: Edit Rule ............................................................................................. 200
Figure 106 Firewall: Customized Services .......................................................................... 202
Figure 107 Firewall: Configure Customized Services ......................................................... 203
Figure 108 Firewall Example: Rules ................................................................................... 204
Figure 109 Edit Custom Port Example ................................................................................ 204
Figure 110 Firewall Example: Edit Rule: Destination Address ........................................... 205
Figure 111 Firewall Example: Edit Rule: Select Customized Services ................................ 206
Figure 112 Firewall Example: Rules: MyService ................................................................ 207
Figure 113 Firewall: Threshold ............................................................................................ 209
Figure 114 Content Filter: Keyword ..................................................................................... 211
Figure 115 Content Filter: Schedule .................................................................................... 212
Figure 116 Content Filter: Trusted ....................................................................................... 213
Figure 117 Encryption and Decryption ................................................................................ 216
Figure 118 IPSec Architecture ............................................................................................ 217
Figure 119 Transport and Tunnel Mode IPSec Encapsulation ............................................ 218
Figure 120 IPSec Summary Fields ..................................................................................... 223
Figure 121 VPN Setup ........................................................................................................ 224
Figure 122 NAT Router Between IPSec Routers ................................................................ 226
Figure 123 VPN Host using Intranet DNS Server Example ................................................ 227
Figure 124 Edit VPN Policies ............................................................................................. 230

Advertising
This manual is related to the following products: