Prestige 652 ADSL Security Router

Figure 8-11 Menu 15.2.1 — NAT Server Setup ...........................................................................................

8-18

Figure 8-12 Multiple Servers Behind NAT Example....................................................................................

8-19

Figure 8-13 NAT Example 1.........................................................................................................................

8-20

Figure 8-14 Menu 4 — Internet Access & NAT Example ............................................................................

8-21

Figure 8-15 NAT Example 2.........................................................................................................................

8-22

Figure 8-16 Menu 15.2.1 — Specifying an Inside Server ............................................................................

8-23

Figure 8-17 NAT Example 3.........................................................................................................................

8-25

Figure 8-18 Example 3: Menu 11.3 ..............................................................................................................

8-26

Figure 8-19 Example 3: Menu 15.1.1.1 ........................................................................................................

8-26

Figure 8-20 Example 3: Final Menu 15.1.1..................................................................................................

8-27

Figure 8-21 NAT Example 4.........................................................................................................................

8-29

Figure 8-22 Example 4: Menu 15.1.1.1 — Address Mapping Rule..............................................................

8-29

Figure 8-23 Example 4: Menu 15.1.1 — Address Mapping Rules ..............................................................

8-30

Figure 9-1 Prestige Firewall Application........................................................................................................

9-3

Figure 9-2 Three-Way Handshake ..................................................................................................................

9-5

Figure 9-3 SYN Flood ....................................................................................................................................

9-5

Figure 9-4 Smurf Attack .................................................................................................................................

9-6

Figure 9-5 Stateful Inspection.........................................................................................................................

9-8

Figure 10-1 Menu 21 — Filter and Firewall Setup.......................................................................................

10-1

Figure 10-2 Menu 21.2 — Firewall Setup ....................................................................................................

10-2

Figure 10-3 Example Firewall Log...............................................................................................................

10-2

Figure 11-1 Enabling the Firewall ................................................................................................................

11-2

Figure 11-2 E-mail Screen ............................................................................................................................

11-3

Figure 11-3 E-mail Log ................................................................................................................................

11-6

Figure 11-4 Attack Alert ...............................................................................................................................

11-8

Figure 12-1 LAN to WAN Traffic.................................................................................................................

12-3

Figure 12-2 WAN to LAN Traffic.................................................................................................................

12-4

List of Figures

xiv