P-202H Plus v2 User’s Guide
List of Figures
20
List of Figures
Figure 1 Internet Access Application
...................................................................................
36
Figure 2 LAN-to-LAN Application Example
.........................................................................
37
Figure 3 Remote Access
.....................................................................................................
37
Figure 4 Secure Internet Access and VPN Application
.......................................................
38
Figure 5 Front Panel
..........................................................................................................
38
Figure 6 Password Screen
..................................................................................................
41
Figure 7 Change Password at Login
...................................................................................
41
Figure 8
Web Configurator: Main Screen
..........................................................................
42
Figure 9 Password
.............................................................................................................
44
Figure 10 Wizard 1: ISDN Line Set Up
...............................................................................
47
Figure 11 Wizard 2: ISP Parameters For Internet Access
..................................................
49
Figure 12 Wizard 3: Summary
...........................................................................................
51
Figure 13 Wizard: LAN Configuration
................................................................................
51
Figure 14 Wizard 4
.............................................................................................................
52
Figure 15 LAN and WAN IP Addresses
..............................................................................
54
Figure 16 LAN Setup
..........................................................................................................
57
Figure 17 WAN Setup
........................................................................................................
61
Figure 18 How NAT Works
..................................................................................................
65
Figure 19 NAT Application With IP Alias
.............................................................................
66
Figure 20 NAT Mode
.........................................................................................................
68
Figure 21 Multiple Servers Behind NAT Example
...............................................................
70
Figure 22 Edit SUA/NAT Server Set
...................................................................................
70
Figure 23 Address Mapping Rules
......................................................................................
71
Figure 24 Edit Address Mapping Rule
..............................................................................
72
Figure 25 Dynamic DNS
.....................................................................................................
75
Figure 26 Firewall Application
.............................................................................................
78
Figure 27 Three-Way Handshake
.......................................................................................
79
Figure 28 SYN Flood
...........................................................................................................
80
Figure 29 Smurf Attack
.......................................................................................................
81
Figure 30 Stateful Inspection
...............................................................................................
82
Figure 31 Enabling the Firewall
...........................................................................................
88
Figure 32 Firewall > E-mail
................................................................................................
89
Figure 33 Firewall > Alert
...................................................................................................
92
Figure 34 Firewall > Rule Summary
...................................................................................
96
Figure 35 Firewall > Edit a Rule
..........................................................................................
98
Figure 36 Firewall > Source and Destination Addresses
....................................................
99
Figure 37 Firewall > Customized Services
..........................................................................
100
Figure 38 Firewall > Configure Customized Services
.........................................................
101