P-662H/HW-D Series User’s Guide

Figure 82 How NAT Works ..................................................................................................

158

Figure 83 NAT Application With IP Alias .............................................................................

159

Figure 84 NAT General .......................................................................................................

161

Figure 85 Multiple Servers Behind NAT Example ...............................................................

163

Figure 86 NAT Port Forwarding ..........................................................................................

163

Figure 87 Port Forwarding Rule Setup ...............................................................................

164

Figure 88 Address Mapping Rules ......................................................................................

166

Figure 89 Edit Address Mapping Rule ...............................................................................

167

Figure 90 Firewall Application .............................................................................................

171

Figure 91 Three-Way Handshake .......................................................................................

172

Figure 92 SYN Flood ...........................................................................................................

173

Figure 93 Smurf Attack .......................................................................................................

174

Figure 94 Stateful Inspection ...............................................................................................

175

Figure 95 Firewall: General .................................................................................................

184

Figure 96 Firewall Rules ....................................................................................................

186

Figure 97 Firewall: Edit Rule ...............................................................................................

188

Figure 98 Firewall: Customized Services ............................................................................

190

Figure 99 Firewall: Configure Customized Services ...........................................................

191

Figure 100 Firewall Example: Rules ...................................................................................

192

Figure 101 Edit Custom Port Example ................................................................................

192

Figure 102 Firewall Example: Edit Rule: Destination Address ...........................................

193

Figure 103 Firewall Example: Edit Rule: Select Customized Services ...............................

194

Figure 104 Firewall Example: Rules: MyService ................................................................

195

Figure 105 Firewall: Anti Probing ........................................................................................

197

Figure 106 Firewall: Threshold ............................................................................................

200

Figure 107 ZyXEL Device Anti-virus Application ................................................................

204

Figure 108 Anti-Virus: Packet Scan ....................................................................................

206

Figure 109 Anti-Virus: Registration and Virus Information Update ......................................

208

Figure 110 Virus Scan Update in Progress .........................................................................

209

Figure 111 Virus Scan Update Successful ..........................................................................

209

Figure 112 Content Filter: Keyword .....................................................................................

211

Figure 113 Content Filter: Schedule ....................................................................................

212

Figure 114 Content Filter: Trusted .......................................................................................

213

Figure 115 Content Access Control with WLAN Application ..............................................

215

Figure 116 Content Access Control: General .....................................................................

216

Figure 117 Control Access Control: General: Time Scheduling .........................................

218

Figure 118 Content Access Control: General: Services .....................................................

219

Figure 119 Content Access Control: General: Web Site Filter ...........................................

222

Figure 120 Content Access Control: General: Diagnose ...................................................

227

Figure 121 Content Access Control: User Profiles .............................................................

228

Figure 122 Content Access Control: Online Status ............................................................

229

Figure 123 Content Access Control: User Login Screen ..................................................

230

Figure 124 Content Access Control: User Logout Screen .................................................

230

List of Figures

27