P-2302HW/HWL-P1 Series User’s Guide

Table 82 Security > Content Filter > Schedule ...................................................................

199

Table 83 Management > Static Route > IP Static Route ....................................................

202

Table 84 Management > Static Route > IP Static Route > Edit ..........................................

203

Table 85 Application and Subnet-based Bandwidth Management Example ......................

206

Table 86 Maximize Bandwidth Usage Example .................................................................

208

Table 87 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example .........

208

Table 88 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example ......

209

Table 89 Bandwidth Borrowing Example ............................................................................

210

Table 90 Over Allotment of Bandwidth Example ................................................................

210

Table 91 Management > Bandwidth MGMT > Summary ...................................................

212

Table 92 Management > Bandwidth MGMT > Class Setup ...............................................

214

Table 93 Management > Bandwidth MGMT > Class Setup > Edit .....................................

215

Table 94 Management > Bandwidth MGMT > Monitor .......................................................

217

Table 95 Management > Remote MGMT > WWW .............................................................

220

Table 96 Management > Remote MGMT > Telnet .............................................................

221

Table 97 Management > Remote MGMT > FTP ................................................................

222

Table 98 SNMP Traps ........................................................................................................

224

Table 99 Remote Management: SNMP ..............................................................................

225

Table 100 Management > Remote MGMT > DNS .............................................................

226

Table 101 Management > Remote MGMT > Security ........................................................

227

Table 102 Management > UPnP ........................................................................................

241

Table 103 Pre-defined NTP Time Servers ..........................................................................

244

Table 104 Maintenance > System > General .....................................................................

246

Table 105 Maintenance > System > Dynamic DNS ...........................................................

247

Table 106 Maintenance > System > Time Setting ..............................................................

249

Table 107 Syslog Logs .......................................................................................................

251

Table 108 Maintenance > Logs > View Log .......................................................................

252

Table 109 Maintenance > Logs > Log Settings ..................................................................

254

Table 110 System Error Logs .............................................................................................

256

Table 111 System Maintenance Logs .................................................................................

256

Table 112 Access Control Logs ..........................................................................................

257

Table 113 TCP Reset Logs ................................................................................................

257

Table 114 Packet Filter Logs ..............................................................................................

258

Table 115 ICMP Logs .........................................................................................................

258

Table 116 PPP Logs ...........................................................................................................

259

Table 117 UPnP Logs .........................................................................................................

259

Table 118 Content Filtering Logs ........................................................................................

259

Table 119 Attack Logs ........................................................................................................

260

Table 120 Remote Management Logs ...............................................................................

261

Table 121 ICMP Notes .......................................................................................................

261

Table 122 SIP Logs ............................................................................................................

263

Table 123 RTP Logs ...........................................................................................................

263

Table 124 Lifeline Logs ......................................................................................................

263

List of Tables

33