P-662H/HW-D Series User’s Guide
Table 39 Wireless: Static WEP Encryption .........................................................................
130
Table 40 Wireless: WPA(2)-PSK ........................................................................................
131
Table 41 Wireless: WPA(2) ................................................................................................
133
Table 42 Wireless LAN: Advanced .....................................................................................
134
Table 43 OTIST ..................................................................................................................
136
Table 44 MAC Address Filter .............................................................................................
140
Table 45 WMM QoS Priorities ............................................................................................
141
Table 46 Commonly Used Services ...................................................................................
143
Table 47 Wireless LAN: QoS ..............................................................................................
145
Table 48 Application Priority Configuration ........................................................................
146
Table 49 Multiple SSID Commands ...................................................................................
149
Table 50 Multiple SSID Example Configuration .................................................................
150
Table 51 DMZ .....................................................................................................................
152
Table 52 NAT Definitions ....................................................................................................
157
Table 53 NAT Mapping Types ............................................................................................
160
Table 54 NAT General ........................................................................................................
161
Table 55 Services and Port Numbers .................................................................................
162
Table 56 NAT Port Forwarding ...........................................................................................
164
Table 57 Port Forwarding Rule Setup ................................................................................
165
Table 58 Address Mapping Rules ......................................................................................
166
Table 59 Edit Address Mapping Rule .................................................................................
167
Table 60 Common IP Ports ................................................................................................
172
Table 61 ICMP Commands That Trigger Alerts ..................................................................
174
Table 62 Legal NetBIOS Commands .................................................................................
Table 63 Legal SMTP Commands ....................................................................................
Table 64 Firewall: General .................................................................................................
185
Table 65 Firewall Rules ......................................................................................................
186
Table 66 Firewall: Edit Rule ................................................................................................
189
Table 67 Customized Services ...........................................................................................
190
Table 68 Firewall: Configure Customized Services ............................................................
191
Table 69 Predefined Services ...........................................................................................
195
Table 70 Firewall: Anti Probing ...........................................................................................
198
Table 71 Firewall: Threshold ..............................................................................................
200
Table 72 Common Computer Virus Types .........................................................................
203
Table 73 Anti-Virus: Packet Scan .......................................................................................
206
Table 74 Anti-Virus: Registration and Virus Information Update ........................................
208
Table 75 Content Filter: Keyword .......................................................................................
212
Table 76 Content Filter: Schedule ......................................................................................
213
Table 77 Content Filter: Trusted .........................................................................................
Table 78 Content Access Control: General ........................................................................
216
Table 79 Control Access Control: General: Time Scheduling ............................................
218
Table 80 Content Access Control: General: Services ........................................................
219
Table 81 Available Services ...............................................................................................
220
34
List of Tables