Prestige 662H/HW Series User’s Guide
Figure 37 Example of Traffic Shaping .................................................................................
114
Figure 38 WAN Setup (PPPoE) ..........................................................................................
115
Figure 39 Traffic Redirect Example .....................................................................................
118
Figure 40 Traffic Redirect LAN Setup .................................................................................
Figure 41 WAN Backup .......................................................................................................
119
Figure 42 Advanced WAN Backup ......................................................................................
121
Figure 43 Advanced Modem Setup .....................................................................................
125
Figure 44 How NAT Works ..................................................................................................
130
Figure 45 NAT Application With IP Alias .............................................................................
Figure 46 Multiple Servers Behind NAT Example ...............................................................
133
Figure 47 NAT Mode ...........................................................................................................
134
Figure 48 Edit SUA/NAT Server Set ...................................................................................
135
Figure 49 Address Mapping Rules ......................................................................................
136
Figure 50 Address Mapping Rule Edit ................................................................................
137
Figure 51 Dynamic DNS .....................................................................................................
141
Figure 52 Time and Date .....................................................................................................
142
Figure 53 Prestige Firewall Application ...............................................................................
146
Figure 54 Three-Way Handshake .......................................................................................
148
Figure 55 SYN Flood ...........................................................................................................
Figure 56 Smurf Attack .......................................................................................................
149
Figure 57 Stateful Inspection ...............................................................................................
151
Figure 58 LAN to WAN Traffic .............................................................................................
161
Figure 59 WAN to LAN Traffic .............................................................................................
162
Figure 60 Firewall: Default Policy ........................................................................................
163
Figure 61 Firewall: Rule Summary .....................................................................................
164
Figure 62 Firewall: Edit Rule ...............................................................................................
166
Figure 63 Firewall: Customized Services ............................................................................
168
Figure 64 Firewall: Configure Customized Services ...........................................................
169
Figure 65 Firewall Example: Rule Summary .......................................................................
170
Figure 66 Firewall Example: Edit Rule: Destination Address .............................................
171
Figure 67 Edit Custom Port Example ..................................................................................
Figure 68 Firewall Example: Edit Rule: Select Customized Services .................................
172
Figure 69 Firewall Example: Rule Summary: My Service ..................................................
173
Figure 70 Firewall: Anti Probing ..........................................................................................
176
Figure 71 Firewall: Threshold ..............................................................................................
178
Figure 72 Content Filter: Keyword ......................................................................................
181
Figure 73 Content Filter: Schedule .....................................................................................
182
Figure 74 Content Filter: Trusted ........................................................................................
183
Figure 75 Content Access Control with WLAN Application ................................................
184
Figure 76 Content Access Control: General .....................................................................
185
Figure 77 Control Access Control: General: Time Scheduling ..........................................
187
Figure 78 Content Access Control: General: Services .....................................................
188
Figure 79 Content Access Control: General: Web Site Filter ............................................
192
27