P-2302HW/HWL-P1 Series User’s Guide
Figure 82 VoIP > Phone > Region ......................................................................................
163
Figure 83 VoIP > Phone Book > Incoming Call Policy ........................................................
166
Figure 84 VoIP > Phone Book > Speed Dial .......................................................................
168
Figure 85 VoIP > PSTN Line > General ..............................................................................
172
Figure 86 Peer Devices Connecting ...................................................................................
174
Figure 87 VoIP Phone To PSTN Phone ..............................................................................
175
Figure 88 PSTN Phone To VoIP Phone ..............................................................................
176
Figure 89 PSTN Phone To PSTN Phone via VoIP ..............................................................
Figure 90 VoIP > Trunking > General ..................................................................................
Figure 91 VoIP > Trunking > Peer Call ...............................................................................
178
Figure 92 VoIP > Trunking > Call Rule ................................................................................
180
Figure 93 VoIP to PSTN Example .......................................................................................
181
Figure 94 VoIP to PSTN Example - Speed Dial Screen ......................................................
182
Figure 95 VoIP to PSTN Example - Outgoing Authentication .............................................
Figure 96 VoIP to PSTN Example - Incoming Authentication .............................................
183
Figure 97 PSTN to PSTN Example .....................................................................................
184
Figure 98 PSTN to PSTN Example: General Configuration ................................................
185
Figure 99 PSTN to PSTN Example - Outgoing Authentication ...........................................
Figure 100 PSTN to PSTN Example - Call Rule .................................................................
186
Figure 101 PSTN to PSTN Example - Incoming Authentication .........................................
187
Figure 102 Firewall Rule Directions ....................................................................................
190
Figure 103 Ideal Firewall Setup ..........................................................................................
191
Figure 104 “Triangle Route” Problem ..................................................................................
192
Figure 105 IP Alias ..............................................................................................................
193
Figure 106 Security > Firewall > General ............................................................................
194
Figure 107 Security > Firewall > Services ...........................................................................
195
Figure 108 Security > Content Filter > Filter .......................................................................
198
Figure 109 Security > Content Filter > Schedule ................................................................
199
Figure 110 Example of Static Routing Topology ..................................................................
201
Figure 111 Management > Static Route > IP Static Route ..................................................
202
Figure 112 Management > Static Route > IP Static Route > Edit ........................................
203
Figure 113 Subnet-based Bandwidth Management Example .............................................
206
Figure 114 Management > Bandwidth MGMT > Summary .................................................
212
Figure 115 Management > Bandwidth MGMT > Class Setup .............................................
214
Figure 116 Management > Bandwidth MGMT > Class Setup > Edit ...................................
215
Figure 117 Management > Bandwidth MGMT > Monitor ....................................................
217
Figure 118 Management > Remote MGMT > WWW ..........................................................
220
Figure 119 Management > Remote MGMT > Telnet ...........................................................
221
Figure 120 Management > Remote MGMT > FTP .............................................................
222
Figure 121 SNMP Management Model ...............................................................................
223
Figure 122 Management > Remote MGMT > SNMP ..........................................................
225
Figure 123 Management > Remote MGMT > DNS .............................................................
226
Figure 124 Management > Remote MGMT > Security .......................................................
227
List of Figures
27