Prestige 662H/HW Series User’s Guide

Figure 37 Example of Traffic Shaping .................................................................................

114

Figure 38 WAN Setup (PPPoE) ..........................................................................................

115

Figure 39 Traffic Redirect Example .....................................................................................

118

Figure 40 Traffic Redirect LAN Setup .................................................................................

118

Figure 41 WAN Backup .......................................................................................................

119

Figure 42 Advanced WAN Backup ......................................................................................

121

Figure 43 Advanced Modem Setup .....................................................................................

125

Figure 44 How NAT Works ..................................................................................................

130

Figure 45 NAT Application With IP Alias .............................................................................

130

Figure 46 Multiple Servers Behind NAT Example ...............................................................

133

Figure 47 NAT Mode ...........................................................................................................

134

Figure 48 Edit SUA/NAT Server Set ...................................................................................

135

Figure 49 Address Mapping Rules ......................................................................................

136

Figure 50 Address Mapping Rule Edit ................................................................................

137

Figure 51 Dynamic DNS .....................................................................................................

141

Figure 52 Time and Date .....................................................................................................

142

Figure 53 Prestige Firewall Application ...............................................................................

146

Figure 54 Three-Way Handshake .......................................................................................

148

Figure 55 SYN Flood ...........................................................................................................

148

Figure 56 Smurf Attack .......................................................................................................

149

Figure 57 Stateful Inspection ...............................................................................................

151

Figure 58 LAN to WAN Traffic .............................................................................................

161

Figure 59 WAN to LAN Traffic .............................................................................................

162

Figure 60 Firewall: Default Policy ........................................................................................

163

Figure 61 Firewall: Rule Summary .....................................................................................

164

Figure 62 Firewall: Edit Rule ...............................................................................................

166

Figure 63 Firewall: Customized Services ............................................................................

168

Figure 64 Firewall: Configure Customized Services ...........................................................

169

Figure 65 Firewall Example: Rule Summary .......................................................................

170

Figure 66 Firewall Example: Edit Rule: Destination Address .............................................

171

Figure 67 Edit Custom Port Example ..................................................................................

171

Figure 68 Firewall Example: Edit Rule: Select Customized Services .................................

172

Figure 69 Firewall Example: Rule Summary: My Service ..................................................

173

Figure 70 Firewall: Anti Probing ..........................................................................................

176

Figure 71 Firewall: Threshold ..............................................................................................

178

Figure 72 Content Filter: Keyword ......................................................................................

181

Figure 73 Content Filter: Schedule .....................................................................................

182

Figure 74 Content Filter: Trusted ........................................................................................

183

Figure 75 Content Access Control with WLAN Application ................................................

184

Figure 76 Content Access Control: General .....................................................................

185

Figure 77 Control Access Control: General: Time Scheduling ..........................................

187

Figure 78 Content Access Control: General: Services .....................................................

188

Figure 79 Content Access Control: General: Web Site Filter ............................................

192

27