ZyXEL Communications 650 Series User Manual

Page 15

Advertising
background image

Prestige 650 Series User’s Guide

List of Figures

xv

Figure 10-5 Stateful Inspection.................................................................................................................... 10-8

Figure 11-1 Enabling the Firewall.................................................................................................................11-1

Figure 11-2 E-mail ........................................................................................................................................11-2

Figure 11-3 Alert ...........................................................................................................................................11-6

Figure 12-1 LAN to WAN Traffic................................................................................................................ 12-3

Figure 12-2 WAN to LAN Traffic................................................................................................................ 12-4

Figure 12-3 Firewall Logs............................................................................................................................ 12-5

Figure 12-4 Firewall Rules Summary: First Screen..................................................................................... 12-7

Figure 12-5 Creating/Editing A Firewall Rule ........................................................................................... 12-12

Figure 12-6 Adding/Editing Source and Destination Addresses ................................................................ 12-14

Figure 12-7 Timeout................................................................................................................................... 12-15

Figure 13-1 Customized Services ................................................................................................................ 13-1

Figure 13-2 Creating/Editing A Customized Service ................................................................................... 13-2

Figure 13-3 Edit Rule Example.................................................................................................................... 13-3

Figure 13-4 Configure Source IP Example .................................................................................................. 13-4

Figure 13-5 Customized Service for MyService Example........................................................................... 13-4

Figure 13-6 Syslog Rule Configuration Example ........................................................................................ 13-5

Figure 13-7 Rule Summary Example........................................................................................................... 13-6

Figure 14-1 Content Filter: Keyword........................................................................................................... 14-2

Figure 14-2 Content Filter: Schedule........................................................................................................... 14-3

Figure 14-3 Content Filter: Trusted.............................................................................................................. 14-4

Figure 14-4 Content Filter Logs................................................................................................................... 14-5

Figure 15-1 Encryption and Decryption....................................................................................................... 15-2

Figure 15-2 VPN Application ...................................................................................................................... 15-3

Figure 15-3 IPSec Architecture.................................................................................................................... 15-4

Figure 15-4 Transport and Tunnel Mode IPSec Encapsulation.................................................................... 15-5

Figure 16-1 IPSec Summary Fields ............................................................................................................. 16-3

Figure 16-2 VPN Summary ......................................................................................................................... 16-4

Figure 16-3 VPN IKE .................................................................................................................................. 16-8

Figure 16-4 Two Phases to Set Up the IPSec SA....................................................................................... 16-13

Figure 16-5 VPN IKE: Advanced .............................................................................................................. 16-16

Figure 16-6 VPN Manual Key ................................................................................................................... 16-20

Figure 16-7 SA Monitor............................................................................................................................. 16-25

Figure 16-8 Global Setting......................................................................................................................... 16-26

Figure 16-9 VPN Logs............................................................................................................................... 16-27

Figure 16-10 Telecommuters Sharing One VPN Rule Example ................................................................ 16-31

Figure 16-11 Telecommuters Using Unique VPN Rules Example ............................................................ 16-32

Figure 17-1 Telnet Configuration on a TCP/IP Network ............................................................................. 17-2

Figure 17-2 Remote Management................................................................................................................ 17-3

Figure 18-1 Configuring UPnP .................................................................................................................... 18-2

Figure 19-1 Log Settings.............................................................................................................................. 19-2

Advertising