ZyXEL Communications 202H User Manual

Page 16

Advertising
background image

Prestige 202H User’s Guide

xvi

List of Figures

Figure 11-1 How NAT Works .......................................................................................................................11-3

Figure 11-2 NAT Application With IP Alias .................................................................................................11-4

Figure 11-3 Applying NAT for Internet Access ............................................................................................11-6

Figure 11-4 Applying NAT to the Remote Node ..........................................................................................11-7

Figure 11-5 Menu 15 NAT Setup..................................................................................................................11-8

Figure 11-6 Menu 15.1 Address Mapping Sets.............................................................................................11-8

Figure 11-7 Menu 15.1.255 SUA Address Mapping Rules...........................................................................11-9

Figure 11-8 Menu 15.1.1 Address Mapping Rules First Set .......................................................................11-10

Figure 11-9 Menu 15.1.1.1 Address Mapping Rule.................................................................................... 11-11

Figure 11-10 Menu 15.2 NAT Server Sets..................................................................................................11-14

Figure 11-11 Menu 15.2 NAT Server Setup................................................................................................11-14

Figure 11-12 Multiple Servers Behind NAT Example................................................................................11-15

Figure 11-13 NAT Example 1.....................................................................................................................11-16

Figure 11-14 Menu 4 Internet Access & NAT Example .............................................................................11-16

Figure 11-15 NAT Example 2.....................................................................................................................11-17

Figure 11-16 Menu 15.2 Specifying an Inside Server ................................................................................11-18

Figure 11-17 NAT Example 3.....................................................................................................................11-19

Figure 11-18 Example 3: Menu 11.3 ..........................................................................................................11-20

Figure 11-19 Example 3: Menu 15.1.1.1 ....................................................................................................11-20

Figure 11-20 Example 3: Final Menu 15.1.1 ..............................................................................................11-21

Figure 11-21 NAT Example 4.....................................................................................................................11-22

Figure 11-22 Example 4: Menu 15.1.1.1 Address Mapping Rule...............................................................11-23

Figure 11-23 Example 4: Menu 15.1.1 Address Mapping Rules ................................................................11-23

Figure 12-1 Prestige Firewall Application....................................................................................................12-3

Figure 12-2 Three-Way Handshake ..............................................................................................................12-5

Figure 12-3 SYN Flood ................................................................................................................................12-5

Figure 12-4 Smurf Attack .............................................................................................................................12-6

Advertising