Prestige 2602HW Series User’s Guide
Figure 39 WAN Backup ..........................................................................................
116
Figure 40 How NAT Works .....................................................................................
121
Figure 41 NAT Application With IP Alias ................................................................
Figure 42 Multiple Servers Behind NAT Example ..................................................
124
Figure 43 NAT Mode ..............................................................................................
125
Figure 44 Edit SUA/NAT Server Set ......................................................................
126
Figure 45 Address Mapping Rules .........................................................................
127
Figure 46 Address Mapping Rule Edit ...................................................................
128
Figure 47 SIP User Agent Server ...........................................................................
133
Figure 48 SIP Proxy Server ...................................................................................
134
Figure 49 SIP Redirect Server ...............................................................................
135
Figure 50 SIP Settings ...........................................................................................
137
Figure 51 Voice Advanced Setup ...........................................................................
139
Figure 52 DiffServ: Differentiated Service Field .....................................................
141
Figure 53 QoS ........................................................................................................
142
Figure 54 Phone .....................................................................................................
143
Figure 55 Speed Dial ..............................................................................................
145
Figure 56 Lifeline ...................................................................................................
147
Figure 57 Phone Port Common .............................................................................
148
Figure 58 Dynamic DNS ........................................................................................
150
Figure 59 Time and Date ........................................................................................
152
Figure 60 Prestige Firewall Application ..................................................................
157
Figure 61 Three-Way Handshake ..........................................................................
159
Figure 62 SYN Flood ..............................................................................................
Figure 63 Smurf Attack ..........................................................................................
160
Figure 64 Stateful Inspection ..................................................................................
162
Figure 65 LAN to WAN Traffic ................................................................................
172
Figure 66 WAN to LAN Traffic ................................................................................
Figure 67 Firewall: Default Policy ...........................................................................
173
Figure 68 Firewall: Rule Summary ........................................................................
175
Figure 69 Firewall: Edit Rule ..................................................................................
177
Figure 70 Firewall: Customized Services ...............................................................
179
Figure 71 Firewall: Configure Customized Services ..............................................
180
Figure 72 Firewall Example: Rule Summary ..........................................................
181
Figure 73 Firewall Example: Edit Rule: Destination Address ................................
182
Figure 74 Edit Custom Port Example .....................................................................
Figure 75 Firewall Example: Edit Rule: Select Customized Services ....................
183
Figure 76 Firewall Example: Rule Summary: My Service .....................................
184
Figure 77 Firewall: Anti Probing .............................................................................
187
Figure 78 Firewall: Threshold .................................................................................
189
Figure 79 Content Filter: Keyword .........................................................................
192
Figure 80 Content Filter: Schedule ........................................................................
193
Figure 81 Content Filter: Trusted ...........................................................................
194
28
List of Figures