Prestige 1600 Universal Access Concentrator

Figure 8-3 Menu 12.1 - Edit IP Static Route...............................................................................................................................

8-3

Figure 9-1 How NAT Works .......................................................................................................................................................

9-2

Figure 9-2 Applying NAT for Internet Access............................................................................................................................

9-4

Figure 9-3 Applying NAT to the Remote Node ..........................................................................................................................

9-4

Figure 9-4 Menu 15 NAT Setup..................................................................................................................................................

9-5

Figure 9-5 Menu 15.1 Address Mapping Sets.............................................................................................................................

9-5

Figure 9-6 SUA Address Mapping Rules ...................................................................................................................................

9-6

Figure 9-7 First Set in Menu 15.1.1 ............................................................................................................................................

9-7

Figure 9-8 Editing an Individual Rule in a Set............................................................................................................................

9-8

Figure 9-9 Multiple Servers Behind NAT ...................................................................................................................................

9-9

Figure 9-10 Menu 15.2 - NAT Server Setup .............................................................................................................................

9-10

Figure 9-11 NAT Example 1 .....................................................................................................................................................

9-11

Figure 9-12 NAT Example for Internet Access.........................................................................................................................

9-11

Figure 9-13 NAT Example 2 .....................................................................................................................................................

9-11

Figure 9-14 Specifying an Inside Sever ....................................................................................................................................

9-12

Figure 9-15 NAT - Example 3...................................................................................................................................................

9-12

Figure 9-16 Example 3 - Menu 15.1.1.1 ...................................................................................................................................

9-13

Figure 9-17 Example 3 Final Menu 15.1.1 ...............................................................................................................................

9-13

Figure 9-18 Example 3 - Menu 15.2 .........................................................................................................................................

9-14

Figure 9-19 Ethernet SUA ........................................................................................................................................................

9-15

Figure 9-20 Applying NAT on the LAN Port ...........................................................................................................................

9-15

Figure 10-1 Outgoing Packet Filtering Process ........................................................................................................................

10-1

Figure 10-2 Filter Rule Process.................................................................................................................................................

10-2

Figure 10-3 Menu 21 - Filter Set Configuration .......................................................................................................................

10-3

Figure 10-4 Menu 21.1 - Filter Rules Summary .......................................................................................................................

10-4

Figure 10-5 Protocol and Device Filter Sets .............................................................................................................................

10-6

Figure 10-6 Menu 21.1.1 - TCP/IP Filter Rule .........................................................................................................................

10-7

Figure 10-7 Executing an IP Filter............................................................................................................................................

10-9

Figure 10-8 Menu 21.1.2 - Device Filter Rule ........................................................................................................................

10-10

Figure 10-9 Filtering Ethernet Traffic.....................................................................................................................................

10-11

Figure 10-10 Filtering Remote Node traffic............................................................................................................................

10-12

Figure 10-11 FTP_WAN Filter Configuration ........................................................................................................................

10-13

Figure 10-12 Filter Rule Configuration ..................................................................................................................................

10-13

Figure 10-13 Filter Rule Configuration ..................................................................................................................................

10-14

Figure 10-14 FTP_WAN Filter Rules Summary.....................................................................................................................

10-14

Figure 10-15 Remote Node Profile .........................................................................................................................................

10-15

Figure 11-1 SNMP Management Model ...................................................................................................................................

11-1

Figure 11-2 Menu 22 - SNMP Configuration ...........................................................................................................................

11-3

Figure 12-1 Menu 23 - System Security ...................................................................................................................................

12-1

xii

List of Figures