List of Figures
P-2302HWUDL-P1 Series User’s Guide
23
Figure 82 VoIP > Phone > DECT Phone .............................................................................................. 151
Figure 83 VoIP > Phone > Common ..................................................................................................... 152
Figure 84 VoIP > Phone > Region ........................................................................................................ 152
Figure 85 VoIP > Phone Book > Incoming Call Policy .......................................................................... 155
Figure 86 VoIP > PSTN Line > General ............................................................................................... 160
Figure 87 Peer Devices Connecting ..................................................................................................... 162
Figure 88 VoIP Phone To PSTN Phone ................................................................................................ 163
Figure 89 PSTN Phone To VoIP Phone ................................................................................................ 164
Figure 90 PSTN Phone To PSTN Phone via VoIP ............................................................................... 164
Figure 91 VoIP > Trunking > General ................................................................................................... 164
Figure 92 VoIP > Trunking > Peer Call ................................................................................................ 166
Figure 93 VoIP > Trunking > Call Rule ................................................................................................. 168
Figure 94 VoIP to PSTN Example ........................................................................................................ 169
Figure 95 VoIP to PSTN Example - Speed Dial Screen ....................................................................... 170
Figure 96 VoIP to PSTN Example - Outgoing Authentication ............................................................... 170
Figure 97 VoIP to PSTN Example - Incoming Authentication ............................................................... 171
Figure 98 PSTN to PSTN Example ...................................................................................................... 172
Figure 99 PSTN to PSTN Example: General Configuration ................................................................. 173
Figure 100 PSTN to PSTN Example - Outgoing Authentication ........................................................... 173
Figure 101 PSTN to PSTN Example - Call Rule .................................................................................. 174
Figure 102 PSTN to PSTN Example - Incoming Authentication ........................................................... 174
Figure 103 Firewall Rule Directions ...................................................................................................... 180
Figure 104 Ideal Firewall Setup ............................................................................................................ 181
Figure 105 “Triangle Route” Problem ................................................................................................... 182
Figure 106 IP Alias ............................................................................................................................... 183
Figure 107 Security > Firewall > General ............................................................................................. 183
Figure 108 Security > Firewall > Services ............................................................................................ 184
Figure 109 Security > Content Filter > Filter ......................................................................................... 188
Figure 110 Security > Content Filter > Schedule .................................................................................. 189
Figure 111 Example of Static Routing Topology ................................................................................... 193
Figure 112 Management > Static Route > IP Static Route ................................................................... 194
Figure 113 Management > Static Route > IP Static Route > Edit ......................................................... 195
Figure 114 Subnet-based Bandwidth Management Example ............................................................... 198
Figure 115 Management > Bandwidth MGMT > Summary .................................................................. 203
Figure 116 Management > Bandwidth MGMT > Class Setup .............................................................. 205
Figure 117 Management > Bandwidth MGMT > Class Setup > Edit .................................................... 206
Figure 118 Management > Bandwidth MGMT > Monitor ...................................................................... 208
Figure 119 Management > Remote MGMT > WWW ............................................................................ 210
Figure 120 Management > Remote MGMT > Telnet .............................................................................211
Figure 121 Management > Remote MGMT > FTP ................................................................................211
Figure 122 SNMP Management Model ................................................................................................ 212
Figure 123 Management > Remote MGMT > SNMP ........................................................................... 214
Figure 124 Management > Remote MGMT > DNS .............................................................................. 215