Prestige 650 Series User’s Guide

 

List of Figures

Figure 1-1 Prestige Internet Access Application.............................................................................................

1-8

Figure 1-2 Prestige LAN-to-LAN Application ...............................................................................................

1-8

Figure 2-1 Password Screen ...........................................................................................................................

2-1

Figure 2-2 Web Configurator SITE MAP Screen ...........................................................................................

2-2

Figure 2-3 Password .......................................................................................................................................

2-3

Figure 2-4 Example Xmodem Upload............................................................................................................

2-5

Figure 3-1 Wizard Screen 1 ............................................................................................................................

3-3

Figure 3-2 Internet Connection with PPPoA ..................................................................................................

3-7

Figure 3-3 Internet Connection with RFC 1483 .............................................................................................

3-9

Figure 3-4 Internet Connection with ENET ENCAP....................................................................................

3-10

Figure 3-5 Internet Connection with PPPoE.................................................................................................

3-11

Figure 3-6 Wizard Screen 3 ..........................................................................................................................

3-13

Figure 3-7 Wizard : LAN Configuration.......................................................................................................

3-14

Figure 3-8 Wizard Screen 4 ..........................................................................................................................

3-15

Figure 4-1 LAN and WAN IP Addresses ........................................................................................................

4-1

Figure 4-2 LAN ..............................................................................................................................................

4-4

Figure 5-1 RTS/CTS .......................................................................................................................................

5-2

Figure 5-2 Prestige Wireless Security Levels .................................................................................................

5-3

Figure 5-3 Wireless.........................................................................................................................................

5-5

Figure 5-4 MAC Address Filter ......................................................................................................................

5-8

Figure 5-5 EAP Authentication.....................................................................................................................

5-11

Figure 5-6 802.1x..........................................................................................................................................

5-11

Figure 5-7 Local User Database ...................................................................................................................

5-14

Figure 5-8 RADIUS......................................................................................................................................

5-16

Figure 6-1 Example of Traffic Shaping ..........................................................................................................

6-2

Figure 6-2 Internet Access Setup.......................................................................................................................

6-3

Figure 7-1 How NAT Works...........................................................................................................................

7-2

Figure 7-2 NAT Application With IP Alias .....................................................................................................

7-3

Figure 7-3 Multiple Servers Behind NAT Example........................................................................................

7-7

Figure 7-4 NAT Mode.....................................................................................................................................

7-7

Figure 7-5 Edit SUA/NAT Server Set.............................................................................................................

7-9

Figure 7-6 Address Mapping Rules ..............................................................................................................

7-11

Figure 7-7 Address Mapping Rule Edit ........................................................................................................

7-12

Figure 8-1 DDNS............................................................................................................................................

8-2

Figure 9-1 Time and Date ...............................................................................................................................

9-1

Figure 10-1 Prestige Firewall Application....................................................................................................

10-3

Figure 10-2 Three-Way Handshake ..............................................................................................................

10-5

Figure 10-3 SYN Flood ................................................................................................................................

10-5

Figure 10-4 Smurf Attack .............................................................................................................................

10-6

xiv

List of Figures