P-662H/HW-D Series User’s Guide

Table 39 Wireless: Static WEP Encryption .........................................................................

130

Table 40 Wireless: WPA(2)-PSK ........................................................................................

131

Table 41 Wireless: WPA(2) ................................................................................................

133

Table 42 Wireless LAN: Advanced .....................................................................................

134

Table 43 OTIST ..................................................................................................................

136

Table 44 MAC Address Filter .............................................................................................

140

Table 45 WMM QoS Priorities ............................................................................................

141

Table 46 Commonly Used Services ...................................................................................

143

Table 47 Wireless LAN: QoS ..............................................................................................

145

Table 48 Application Priority Configuration ........................................................................

146

Table 49 Multiple SSID Commands ...................................................................................

149

Table 50 Multiple SSID Example Configuration .................................................................

150

Table 51 DMZ .....................................................................................................................

152

Table 52 NAT Definitions ....................................................................................................

157

Table 53 NAT Mapping Types ............................................................................................

160

Table 54 NAT General ........................................................................................................

161

Table 55 Services and Port Numbers .................................................................................

162

Table 56 NAT Port Forwarding ...........................................................................................

164

Table 57 Port Forwarding Rule Setup ................................................................................

165

Table 58 Address Mapping Rules ......................................................................................

166

Table 59 Edit Address Mapping Rule .................................................................................

167

Table 60 Common IP Ports ................................................................................................

172

Table 61 ICMP Commands That Trigger Alerts ..................................................................

174

Table 62 Legal NetBIOS Commands .................................................................................

174

Table 63 Legal SMTP Commands ....................................................................................

174

Table 64 Firewall: General .................................................................................................

185

Table 65 Firewall Rules ......................................................................................................

186

Table 66 Firewall: Edit Rule ................................................................................................

189

Table 67 Customized Services ...........................................................................................

190

Table 68 Firewall: Configure Customized Services ............................................................

191

Table 69 Predefined Services ...........................................................................................

195

Table 70 Firewall: Anti Probing ...........................................................................................

198

Table 71 Firewall: Threshold ..............................................................................................

200

Table 72 Common Computer Virus Types .........................................................................

203

Table 73 Anti-Virus: Packet Scan .......................................................................................

206

Table 74 Anti-Virus: Registration and Virus Information Update ........................................

208

Table 75 Content Filter: Keyword .......................................................................................

212

Table 76 Content Filter: Schedule ......................................................................................

213

Table 77 Content Filter: Trusted .........................................................................................

213

Table 78 Content Access Control: General ........................................................................

216

Table 79 Control Access Control: General: Time Scheduling ............................................

218

Table 80 Content Access Control: General: Services ........................................................

219

Table 81 Available Services ...............................................................................................

220

34

List of Tables