ZyXEL Communications 650 Series Network Card User Manual


 
Prestige 650 Series User’s Guide
xiv List of Figures
List of Figures
Figure 1-1 Prestige Internet Access Application.............................................................................................1-8
Figure 1-2 Prestige LAN-to-LAN Application...............................................................................................1-8
Figure 2-1 Password Screen ...........................................................................................................................2-1
Figure 2-2 Web Configurator SITE MAP Screen ...........................................................................................2-2
Figure 2-3 Password .......................................................................................................................................2-3
Figure 2-4 Example Xmodem Upload............................................................................................................2-5
Figure 3-1 Wizard Screen 1 ............................................................................................................................3-3
Figure 3-2 Internet Connection with PPPoA ..................................................................................................3-7
Figure 3-3 Internet Connection with RFC 1483 .............................................................................................3-9
Figure 3-4 Internet Connection with ENET ENCAP....................................................................................3-10
Figure 3-5 Internet Connection with PPPoE.................................................................................................3-11
Figure 3-6 Wizard Screen 3 ..........................................................................................................................3-13
Figure 3-7 Wizard : LAN Configuration.......................................................................................................3-14
Figure 3-8 Wizard Screen 4 ..........................................................................................................................3-15
Figure 4-1 LAN and WAN IP Addresses........................................................................................................4-1
Figure 4-2 LAN ..............................................................................................................................................4-4
Figure 5-1 RTS/CTS.......................................................................................................................................5-2
Figure 5-2 Prestige Wireless Security Levels.................................................................................................5-3
Figure 5-3 Wireless.........................................................................................................................................5-5
Figure 5-4 MAC Address Filter......................................................................................................................5-8
Figure 5-5 EAP Authentication.....................................................................................................................5-11
Figure 5-6 802.1x..........................................................................................................................................5-11
Figure 5-7 Local User Database ...................................................................................................................5-14
Figure 5-8 RADIUS......................................................................................................................................5-16
Figure 6-1 Example of Traffic Shaping ..........................................................................................................6-2
Figure 6-2 Internet Access Setup.......................................................................................................................6-3
Figure 7-1 How NAT Works...........................................................................................................................7-2
Figure 7-2 NAT Application With IP Alias.....................................................................................................7-3
Figure 7-3 Multiple Servers Behind NAT Example........................................................................................7-7
Figure 7-4 NAT Mode.....................................................................................................................................7-7
Figure 7-5 Edit SUA/NAT Server Set.............................................................................................................7-9
Figure 7-6 Address Mapping Rules ..............................................................................................................7-11
Figure 7-7 Address Mapping Rule Edit ........................................................................................................7-12
Figure 8-1 DDNS............................................................................................................................................8-2
Figure 9-1 Time and Date...............................................................................................................................9-1
Figure 10-1 Prestige Firewall Application....................................................................................................10-3
Figure 10-2 Three-Way Handshake..............................................................................................................10-5
Figure 10-3 SYN Flood ................................................................................................................................10-5
Figure 10-4 Smurf Attack.............................................................................................................................10-6