ZyXEL Communications 660H Series Network Router User Manual


 
Prestige 660H/HW Series User’s Guide
25
Figure 37 Example Wireless Client OTIST Screen ............................................................. 101
Figure 38 Security Key ........................................................................................................ 101
Figure 39 OTIST in Progress (Prestige) .............................................................................. 101
Figure 40 OTIST in Progress (Client) .................................................................................. 101
Figure 41 No AP with OTIST Found ................................................................................... 102
Figure 42 Start OTIST? ....................................................................................................... 102
Figure 43 Example of Traffic Shaping ................................................................................. 106
Figure 44 WAN Setup (PPPoE) .......................................................................................... 107
Figure 45 Traffic Redirect Example ..................................................................................... 110
Figure 46 Traffic Redirect LAN Setup ................................................................................. 110
Figure 47 WAN Backup ....................................................................................................... 111
Figure 48 How NAT Works .................................................................................................. 116
Figure 49 NAT Application With IP Alias ............................................................................. 116
Figure 50 Multiple Servers Behind NAT Example ............................................................... 119
Figure 51 NAT Mode ........................................................................................................... 120
Figure 52 Edit SUA/NAT Server Set ................................................................................... 121
Figure 53 Address Mapping Rules ...................................................................................... 122
Figure 54 Address Mapping Rule Edit ................................................................................ 123
Figure 55 Dynamic DNS ..................................................................................................... 127
Figure 56 Time and Date ..................................................................................................... 128
Figure 57 Prestige Firewall Application ............................................................................... 132
Figure 58 Three-Way Handshake ....................................................................................... 133
Figure 59 SYN Flood ........................................................................................................... 134
Figure 60 Smurf Attack ....................................................................................................... 135
Figure 61 Stateful Inspection ............................................................................................... 137
Figure 62 LAN to WAN Traffic ............................................................................................. 147
Figure 63 WAN to LAN Traffic ............................................................................................. 147
Figure 64 Firewall: Default Policy ........................................................................................ 148
Figure 65 Firewall: Rule Summary ..................................................................................... 149
Figure 66 Firewall: Edit Rule ............................................................................................... 152
Figure 67 Firewall: Customized Services ............................................................................ 154
Figure 68 Firewall: Configure Customized Services ........................................................... 155
Figure 69 Firewall Example: Rule Summary ....................................................................... 156
Figure 70 Firewall Example: Edit Rule: Destination Address ............................................. 157
Figure 71 Edit Custom Port Example .................................................................................. 157
Figure 72 Firewall Example: Edit Rule: Select Customized Services ................................. 158
Figure 73 Firewall Example: Rule Summary: My Service .................................................. 159
Figure 74 Firewall: Anti Probing .......................................................................................... 162
Figure 75 Firewall: Threshold .............................................................................................. 164
Figure 76 Content Filter: Keyword ...................................................................................... 166
Figure 77 Content Filter: Schedule ..................................................................................... 167
Figure 78 Content Filter: Trusted ........................................................................................ 168
Figure 79 Telnet Configuration on a TCP/IP Network ......................................................... 171