List of Figures

Figure 82 VoIP > Phone > DECT Phone ..............................................................................................

151

Figure 83 VoIP > Phone > Common .....................................................................................................

152

Figure 84 VoIP > Phone > Region ........................................................................................................

152

Figure 85 VoIP > Phone Book > Incoming Call Policy ..........................................................................

155

Figure 86 VoIP > PSTN Line > General ...............................................................................................

160

Figure 87 Peer Devices Connecting .....................................................................................................

162

Figure 88 VoIP Phone To PSTN Phone ................................................................................................

163

Figure 89 PSTN Phone To VoIP Phone ................................................................................................

164

Figure 90 PSTN Phone To PSTN Phone via VoIP ...............................................................................

164

Figure 91 VoIP > Trunking > General ...................................................................................................

164

Figure 92 VoIP > Trunking > Peer Call ................................................................................................

166

Figure 93 VoIP > Trunking > Call Rule .................................................................................................

168

Figure 94 VoIP to PSTN Example ........................................................................................................

169

Figure 95 VoIP to PSTN Example - Speed Dial Screen .......................................................................

170

Figure 96 VoIP to PSTN Example - Outgoing Authentication ...............................................................

170

Figure 97 VoIP to PSTN Example - Incoming Authentication ...............................................................

171

Figure 98 PSTN to PSTN Example ......................................................................................................

172

Figure 99 PSTN to PSTN Example: General Configuration .................................................................

173

Figure 100 PSTN to PSTN Example - Outgoing Authentication ...........................................................

173

Figure 101 PSTN to PSTN Example - Call Rule ..................................................................................

174

Figure 102 PSTN to PSTN Example - Incoming Authentication ...........................................................

174

Figure 103 Firewall Rule Directions ......................................................................................................

180

Figure 104 Ideal Firewall Setup ............................................................................................................

181

Figure 105 “Triangle Route” Problem ...................................................................................................

182

Figure 106 IP Alias ...............................................................................................................................

183

Figure 107 Security > Firewall > General .............................................................................................

183

Figure 108 Security > Firewall > Services ............................................................................................

184

Figure 109 Security > Content Filter > Filter .........................................................................................

188

Figure 110 Security > Content Filter > Schedule ..................................................................................

189

Figure 111 Example of Static Routing Topology ...................................................................................

193

Figure 112 Management > Static Route > IP Static Route ...................................................................

194

Figure 113 Management > Static Route > IP Static Route > Edit .........................................................

195

Figure 114 Subnet-based Bandwidth Management Example ...............................................................

198

Figure 115 Management > Bandwidth MGMT > Summary ..................................................................

203

Figure 116 Management > Bandwidth MGMT > Class Setup ..............................................................

205

Figure 117 Management > Bandwidth MGMT > Class Setup > Edit ....................................................

206

Figure 118 Management > Bandwidth MGMT > Monitor ......................................................................

208

Figure 119 Management > Remote MGMT > WWW ............................................................................

210

Figure 120 Management > Remote MGMT > Telnet .............................................................................

211

Figure 121 Management > Remote MGMT > FTP ................................................................................

211

Figure 122 SNMP Management Model ................................................................................................

212

Figure 123 Management > Remote MGMT > SNMP ...........................................................................

214

Figure 124 Management > Remote MGMT > DNS ..............................................................................

215

P-2302HWUDL-P1 Series User’s Guide

23