Prestige 2602H/HW Series User’s Guide
Figure 81 Firewall Example: Edit Rule: Select Customized Services ....................
195
Figure 82 Firewall Example: Rule Summary: My Service .....................................
196
Figure 83 Firewall: Anti Probing .............................................................................
199
Figure 84 Firewall: Threshold .................................................................................
201
Figure 85 Content Filter: Keyword .........................................................................
204
Figure 86 Content Filter: Schedule ........................................................................
205
Figure 87 Content Filter: Trusted ...........................................................................
206
Figure 88 Encryption and Decryption .....................................................................
208
Figure 89 IPSec Architecture .................................................................................
209
Figure 90 Transport and Tunnel Mode IPSec Encapsulation .................................
210
Figure 91 IPSec Summary Fields ..........................................................................
215
Figure 92 VPN Summary .......................................................................................
216
Figure 93 VPN Host using Intranet DNS Server Example .....................................
218
Figure 94 NAT Router Between IPSec Routers .....................................................
Figure 95 VPN IKE .................................................................................................
222
Figure 96 Two Phases to Set Up the IPSec SA .....................................................
227
Figure 97 VPN IKE: Advanced Setup ....................................................................
229
Figure 98 VPN: Manual Key ...................................................................................
232
Figure 99 VPN: SA Monitor ....................................................................................
236
Figure 100 VPN: Global Setting .............................................................................
237
Figure 101 Telecommuters Sharing One VPN Rule Example ................................
238
Figure 102 Telecommuters Using Unique VPN Rules Example ............................
239
Figure 103 Telnet Configuration on a TCP/IP Network ..........................................
242
Figure 104 Remote Management ..........................................................................
243
Figure 105 Configuring UPnP ................................................................................
246
Figure 106 Add/Remove Programs: Windows Setup: Communication ..................
248
Figure 107 Add/Remove Programs: Windows Setup: Communication: Components
Figure 108 Network Connections ...........................................................................
249
Figure 109 Windows Optional Networking Components Wizard ...........................
250
Figure 110 Networking Services ............................................................................
251
Figure 111 Network Connections ...........................................................................
252
Figure 112 Internet Connection Properties ...........................................................
253
Figure 113 Internet Connection Properties: Advanced Settings ............................
254
Figure 114 Internet Connection Properties: Advanced Settings: Add ....................
Figure 115 System Tray Icon .................................................................................
255
Figure 116 Internet Connection Status ...................................................................
Figure 117 Network Connections ...........................................................................
256
Figure 118 Network Connections: My Network Places ..........................................
257
Figure 119 Network Connections: My Network Places: Properties: Example ........
Figure 120 Log Settings .........................................................................................
260
Figure 121 View Logs ............................................................................................
262
Figure 122 E-mail Log Example .............................................................................
264
List of Figures
31