List of Figures

Figure 82 Port Forwarding Rule Setup ...............................................................................................

144

Figure 83 Address Mapping Rules .......................................................................................................

145

Figure 84 Edit Address Mapping Rule ................................................................................................

147

Figure 85 Network > NAT > ALG ..........................................................................................................

148

Figure 86 SIP User Agent .....................................................................................................................

151

Figure 87 SIP Proxy Server ..................................................................................................................

151

Figure 88 SIP Redirect Server ..............................................................................................................

152

Figure 89 DiffServ: Differentiated Service Field ....................................................................................

155

Figure 90 SIP > SIP Settings ................................................................................................................

155

Figure 91 VoIP > SIP Settings > Advanced ..........................................................................................

157

Figure 92 SIP > QoS ............................................................................................................................

160

Figure 93 Phone > Analog Phone ........................................................................................................

161

Figure 94 Phone > Analog Phone > Advanced ....................................................................................

162

Figure 95 Phone > Common ................................................................................................................

164

Figure 96 VoIP > Phone > Region ........................................................................................................

168

Figure 97 Phone Book > Speed Dial ....................................................................................................

169

Figure 98 Phone Book > Incoming Call Policy .....................................................................................

170

Figure 99 Phone Book > Distinctive Ring .............................................................................................

172

Figure 100 PSTN Line > General .........................................................................................................

174

Figure 101 Peer Devices Connecting ...................................................................................................

176

Figure 102 VoIP Phone To PSTN Phone ..............................................................................................

177

Figure 103 PSTN Phone To VoIP Phone ..............................................................................................

178

Figure 104 PSTN Phone To PSTN Phone via VoIP .............................................................................

178

Figure 105 VoIP > Trunking > General .................................................................................................

178

Figure 106 VoIP > Trunking > Peer Call ..............................................................................................

180

Figure 107 VoIP > Trunking > Call Rule ...............................................................................................

182

Figure 108 VoIP to PSTN Example ......................................................................................................

183

Figure 109 VoIP to PSTN Example - Speed Dial Screen .....................................................................

184

Figure 110 VoIP to PSTN Example - Outgoing Authentication .............................................................

184

Figure 111 VoIP to PSTN Example - Incoming Authentication .............................................................

185

Figure 112 PSTN to PSTN Example ....................................................................................................

186

Figure 113 PSTN to PSTN Example: General Configuration ...............................................................

187

Figure 114 PSTN to PSTN Example - Outgoing Authentication From Device B ..................................

187

Figure 115 PSTN to PSTN Example - Call Rule ...................................................................................

188

Figure 116 PSTN to PSTN Example - Incoming Authentication To Device C .......................................

188

Figure 117 Firewall Application .............................................................................................................

197

Figure 118 Three-Way Handshake .......................................................................................................

198

Figure 119 SYN Flood ..........................................................................................................................

199

Figure 120 Smurf Attack .......................................................................................................................

199

Figure 121 Stateful Inspection ..............................................................................................................

201

Figure 122 Firewall: General ................................................................................................................

210

Figure 123 Firewall Rules ....................................................................................................................

212

Figure 124 Firewall: Edit Rule ..............................................................................................................

214

P-2602H(W)(L)-DxA User’s Guide

25