Prestige 2602HW Series User’s Guide

Figure 39 WAN Backup ..........................................................................................

116

Figure 40 How NAT Works .....................................................................................

121

Figure 41 NAT Application With IP Alias ................................................................

121

Figure 42 Multiple Servers Behind NAT Example ..................................................

124

Figure 43 NAT Mode ..............................................................................................

125

Figure 44 Edit SUA/NAT Server Set ......................................................................

126

Figure 45 Address Mapping Rules .........................................................................

127

Figure 46 Address Mapping Rule Edit ...................................................................

128

Figure 47 SIP User Agent Server ...........................................................................

133

Figure 48 SIP Proxy Server ...................................................................................

134

Figure 49 SIP Redirect Server ...............................................................................

135

Figure 50 SIP Settings ...........................................................................................

137

Figure 51 Voice Advanced Setup ...........................................................................

139

Figure 52 DiffServ: Differentiated Service Field .....................................................

141

Figure 53 QoS ........................................................................................................

142

Figure 54 Phone .....................................................................................................

143

Figure 55 Speed Dial ..............................................................................................

145

Figure 56 Lifeline ...................................................................................................

147

Figure 57 Phone Port Common .............................................................................

148

Figure 58 Dynamic DNS ........................................................................................

150

Figure 59 Time and Date ........................................................................................

152

Figure 60 Prestige Firewall Application ..................................................................

157

Figure 61 Three-Way Handshake ..........................................................................

159

Figure 62 SYN Flood ..............................................................................................

159

Figure 63 Smurf Attack ..........................................................................................

160

Figure 64 Stateful Inspection ..................................................................................

162

Figure 65 LAN to WAN Traffic ................................................................................

172

Figure 66 WAN to LAN Traffic ................................................................................

172

Figure 67 Firewall: Default Policy ...........................................................................

173

Figure 68 Firewall: Rule Summary ........................................................................

175

Figure 69 Firewall: Edit Rule ..................................................................................

177

Figure 70 Firewall: Customized Services ...............................................................

179

Figure 71 Firewall: Configure Customized Services ..............................................

180

Figure 72 Firewall Example: Rule Summary ..........................................................

181

Figure 73 Firewall Example: Edit Rule: Destination Address ................................

182

Figure 74 Edit Custom Port Example .....................................................................

182

Figure 75 Firewall Example: Edit Rule: Select Customized Services ....................

183

Figure 76 Firewall Example: Rule Summary: My Service .....................................

184

Figure 77 Firewall: Anti Probing .............................................................................

187

Figure 78 Firewall: Threshold .................................................................................

189

Figure 79 Content Filter: Keyword .........................................................................

192

Figure 80 Content Filter: Schedule ........................................................................

193

Figure 81 Content Filter: Trusted ...........................................................................

194

28

List of Figures