P-2602H(W)(L)-DxA Series User’s Guide
List of Figures
25
Figure 82 Port Forwarding Rule Setup
..............................................................................
148
Figure 83 Network > NAT > ALG
........................................................................................
149
Figure 84 SIP User Agent
...................................................................................................
153
Figure 85 SIP Proxy Server
................................................................................................
153
Figure 86 SIP Redirect Server
............................................................................................
154
Figure 87 SIP > SIP Settings
..............................................................................................
155
Figure 88 VoIP > SIP Settings > Advanced
........................................................................
159
Figure 89 DiffServ: Differentiated Service Field
..................................................................
162
Figure 90 SIP > QoS
...........................................................................................................
163
Figure 91 Phone > Analog Phone
.......................................................................................
165
Figure 92 Phone > Analog Phone > Advanced
...................................................................
166
Figure 93 Phone > Common
...............................................................................................
167
Figure 94 VoIP > Phone > Region
......................................................................................
172
Figure 95 Phone Book > Speed Dial
...................................................................................
173
Figure 96 Phone Book > Incoming Call Policy
....................................................................
175
Figure 97 PSTN Line > General
..........................................................................................
177
Figure 98 Firewall Application
.............................................................................................
183
Figure 99 Three-Way Handshake
.......................................................................................
184
Figure 100 SYN Flood
.........................................................................................................
185
Figure 101 Smurf Attack
.....................................................................................................
186
Figure 102 Stateful Inspection
.............................................................................................
187
Figure 103 Firewall: General
...............................................................................................
196
Figure 104 Firewall Rules
..................................................................................................
198
Figure 105 Firewall: Edit Rule
.............................................................................................
200
Figure 106 Firewall: Customized Services
..........................................................................
202
Figure 107 Firewall: Configure Customized Services
.........................................................
203
Figure 108 Firewall Example: Rules
...................................................................................
204
Figure 109 Edit Custom Port Example
................................................................................
204
Figure 110 Firewall Example: Edit Rule: Destination Address
...........................................
205
Figure 111 Firewall Example: Edit Rule: Select Customized Services
................................
206
Figure 112 Firewall Example: Rules: MyService
................................................................
207
Figure 113 Firewall: Threshold
............................................................................................
209
Figure 114 Content Filter: Keyword
.....................................................................................
211
Figure 115 Content Filter: Schedule
....................................................................................
212
Figure 116 Content Filter: Trusted
.......................................................................................
213
Figure 117 Encryption and Decryption
................................................................................
216
Figure 118 IPSec Architecture
............................................................................................
217
Figure 119 Transport and Tunnel Mode IPSec Encapsulation
............................................
218
Figure 120 IPSec Summary Fields
.....................................................................................
223
Figure 121 VPN Setup
........................................................................................................
224
Figure 122 NAT Router Between IPSec Routers
................................................................
226
Figure 123 VPN Host using Intranet DNS Server Example
................................................
227
Figure 124 Edit VPN Policies
.............................................................................................
230