Prestige 2602H/HW Series User’s Guide
Table 39 QoS ........................................................................................................
144
Table 40 Phone .....................................................................................................
146
Table 41 Speed Dial ..............................................................................................
148
Table 42 Lifeline ....................................................................................................
150
Table 43 European Flash Key Commands ............................................................
151
Table 44 USA Flash Key Commands ....................................................................
153
Table 45 Voice Common .......................................................................................
154
Table 46 Voice Call Forward .................................................................................
156
Table 47 Dynamic DNS .........................................................................................
162
Table 48 Pre-defined NTP Time Servers ...............................................................
163
Table 49 Time and Date ........................................................................................
164
Table 50 Common IP Ports ...................................................................................
170
Table 51 ICMP Commands That Trigger Alerts .....................................................
172
Table 52 Legal NetBIOS Commands ....................................................................
Table 53 Legal SMTP Commands .......................................................................
173
Table 54 Firewall: Default Policy ...........................................................................
185
Table 55 Rule Summary ........................................................................................
187
Table 56 Firewall: Edit Rule ...................................................................................
190
Table 57 Customized Services ..............................................................................
191
Table 58 Firewall: Configure Customized Services ...............................................
192
Table 59 Predefined Services ..............................................................................
196
Table 60 Firewall: Anti Probing ..............................................................................
199
Table 61 Firewall: Threshold .................................................................................
201
Table 62 Content Filter: Keyword ..........................................................................
204
Table 63 Content Filter: Schedule .........................................................................
205
Table 64 Content Filter: Trusted ............................................................................
206
Table 65 VPN and NAT .........................................................................................
211
Table 66 AH and ESP ...........................................................................................
214
Table 67 VPN Summary ........................................................................................
216
Table 68 Local ID Type and Content Fields ..........................................................
220
Table 69 Peer ID Type and Content Fields ...........................................................
Table 70 Matching ID Type and Content Configuration Example ..........................
Table 71 Mismatching ID Type and Content Configuration Example ....................
221
Table 72 VPN IKE .................................................................................................
223
Table 73 VPN IKE: Advanced Setup .....................................................................
229
Table 74 VPN: Manual Key ...................................................................................
233
Table 75 VPN: SA Monitor ....................................................................................
236
Table 76 VPN: Global Setting ................................................................................
237
Table 77 Telecommuters Sharing One VPN Rule Example ..................................
238
Table 78 Telecommuters Using Unique VPN Rules Example ...............................
239
Table 79 Remote Management .............................................................................
243
Table 80 Configuring UPnP ...................................................................................
247
Table 81 Log Settings ............................................................................................
261
38
List of Tables