List of Figures
Figure 125 VoIP > Trunking > Call Rule ...............................................................................................
218
Figure 126 VoIP to PSTN Example ......................................................................................................
219
Figure 127 VoIP to PSTN Example - Speed Dial Screen .....................................................................
220
Figure 128 VoIP to PSTN Example - Outgoing Authentication .............................................................
Figure 129 VoIP to PSTN Example - Incoming Authentication .............................................................
221
Figure 130 PSTN to PSTN Example ....................................................................................................
222
Figure 131 PSTN to PSTN Example: General Configuration ...............................................................
223
Figure 132 PSTN to PSTN Example - Outgoing Authentication ...........................................................
Figure 133 PSTN to PSTN Example - Call Rule ..................................................................................
224
Figure 134 PSTN to PSTN Example - Incoming Authentication ...........................................................
Figure 135 Firewall Application ............................................................................................................
235
Figure 136 Three-Way Handshake .......................................................................................................
236
Figure 137 SYN Flood ..........................................................................................................................
237
Figure 138 Smurf Attack .......................................................................................................................
Figure 139 Stateful Inspection ..............................................................................................................
239
Figure 140 Firewall: General ................................................................................................................
248
Figure 141 Firewall Rules ....................................................................................................................
250
Figure 142 Firewall: Edit Rule ..............................................................................................................
252
Figure 143 Firewall: Customized Services ...........................................................................................
254
Figure 144 Firewall: Configure Customized Services ...........................................................................
255
Figure 145 Firewall Example: Rules .....................................................................................................
256
Figure 146 Edit Custom Port Example .................................................................................................
Figure 147 Firewall Example: Edit Rule: Destination Address ............................................................
257
Figure 148 Firewall Example: Edit Rule: Select Customized Services .................................................
258
Figure 149 Firewall Example: Rules: MyService .................................................................................
259
Figure 150 Firewall: Threshold .............................................................................................................
261
Figure 151 Content Filter: Keyword ......................................................................................................
265
Figure 152 Content Filter: Schedule .....................................................................................................
266
Figure 153 Content Filter: Trusted ........................................................................................................
267
Figure 154 Encryption and Decryption .................................................................................................
270
Figure 155 IPSec Architecture ..............................................................................................................
271
Figure 156 Transport and Tunnel Mode IPSec Encapsulation .............................................................
272
Figure 157 IPSec Summary Fields .......................................................................................................
277
Figure 158 VPN Setup ..........................................................................................................................
278
Figure 159 NAT Router Between IPSec Routers .................................................................................
280
Figure 160 VPN Host using Intranet DNS Server Example ..................................................................
281
Figure 161 Edit VPN Policies ..............................................................................................................
284
Figure 162 Two Phases to Set Up the IPSec SA .................................................................................
288
Figure 163 Advanced VPN Policies ......................................................................................................
290
Figure 164 VPN: Manual Key ...............................................................................................................
293
Figure 165 VPN: SA Monitor ................................................................................................................
296
Figure 166 VPN: Global Setting ...........................................................................................................
297
Figure 167 Telecommuters Sharing One VPN Rule Example ..............................................................
298
28
P-2602HWLNI User’s Guide