List of Figures
Figure 82 VoIP > Phone > DECT Phone ..............................................................................................
151
Figure 83 VoIP > Phone > Common .....................................................................................................
152
Figure 84 VoIP > Phone > Region ........................................................................................................
Figure 85 VoIP > Phone Book > Incoming Call Policy ..........................................................................
155
Figure 86 VoIP > PSTN Line > General ...............................................................................................
160
Figure 87 Peer Devices Connecting .....................................................................................................
162
Figure 88 VoIP Phone To PSTN Phone ................................................................................................
163
Figure 89 PSTN Phone To VoIP Phone ................................................................................................
164
Figure 90 PSTN Phone To PSTN Phone via VoIP ...............................................................................
Figure 91 VoIP > Trunking > General ...................................................................................................
Figure 92 VoIP > Trunking > Peer Call ................................................................................................
166
Figure 93 VoIP > Trunking > Call Rule .................................................................................................
168
Figure 94 VoIP to PSTN Example ........................................................................................................
169
Figure 95 VoIP to PSTN Example - Speed Dial Screen .......................................................................
170
Figure 96 VoIP to PSTN Example - Outgoing Authentication ...............................................................
Figure 97 VoIP to PSTN Example - Incoming Authentication ...............................................................
171
Figure 98 PSTN to PSTN Example ......................................................................................................
172
Figure 99 PSTN to PSTN Example: General Configuration .................................................................
173
Figure 100 PSTN to PSTN Example - Outgoing Authentication ...........................................................
Figure 101 PSTN to PSTN Example - Call Rule ..................................................................................
174
Figure 102 PSTN to PSTN Example - Incoming Authentication ...........................................................
Figure 103 Firewall Rule Directions ......................................................................................................
180
Figure 104 Ideal Firewall Setup ............................................................................................................
181
Figure 105 “Triangle Route” Problem ...................................................................................................
182
Figure 106 IP Alias ...............................................................................................................................
183
Figure 107 Security > Firewall > General .............................................................................................
Figure 108 Security > Firewall > Services ............................................................................................
184
Figure 109 Security > Content Filter > Filter .........................................................................................
188
Figure 110 Security > Content Filter > Schedule ..................................................................................
189
Figure 111 Example of Static Routing Topology ...................................................................................
193
Figure 112 Management > Static Route > IP Static Route ...................................................................
194
Figure 113 Management > Static Route > IP Static Route > Edit .........................................................
195
Figure 114 Subnet-based Bandwidth Management Example ...............................................................
198
Figure 115 Management > Bandwidth MGMT > Summary ..................................................................
203
Figure 116 Management > Bandwidth MGMT > Class Setup ..............................................................
205
Figure 117 Management > Bandwidth MGMT > Class Setup > Edit ....................................................
206
Figure 118 Management > Bandwidth MGMT > Monitor ......................................................................
208
Figure 119 Management > Remote MGMT > WWW ............................................................................
210
Figure 120 Management > Remote MGMT > Telnet .............................................................................
211
Figure 121 Management > Remote MGMT > FTP ................................................................................
Figure 122 SNMP Management Model ................................................................................................
212
Figure 123 Management > Remote MGMT > SNMP ...........................................................................
214
Figure 124 Management > Remote MGMT > DNS ..............................................................................
215
P-2302HWUDL-P1 Series User’s Guide
23