List of Figures

Figure 125 VoIP > Trunking > Call Rule ...............................................................................................

218

 

Figure 126 VoIP to PSTN Example ......................................................................................................

219

 

Figure 127 VoIP to PSTN Example - Speed Dial Screen .....................................................................

220

 

Figure 128 VoIP to PSTN Example - Outgoing Authentication .............................................................

220

 

Figure 129 VoIP to PSTN Example - Incoming Authentication .............................................................

221

 

Figure 130 PSTN to PSTN Example ....................................................................................................

222

 

Figure 131 PSTN to PSTN Example: General Configuration ...............................................................

223

 

Figure 132 PSTN to PSTN Example - Outgoing Authentication ...........................................................

223

 

Figure 133 PSTN to PSTN Example - Call Rule ..................................................................................

224

 

Figure 134 PSTN to PSTN Example - Incoming Authentication ...........................................................

224

 

Figure 135 Firewall Application ............................................................................................................

235

 

Figure 136 Three-Way Handshake .......................................................................................................

236

 

Figure 137 SYN Flood ..........................................................................................................................

237

 

Figure 138 Smurf Attack .......................................................................................................................

237

 

Figure 139 Stateful Inspection ..............................................................................................................

239

 

Figure 140 Firewall: General ................................................................................................................

248

 

Figure 141 Firewall Rules ....................................................................................................................

250

 

Figure 142 Firewall: Edit Rule ..............................................................................................................

252

 

Figure 143 Firewall: Customized Services ...........................................................................................

254

 

Figure 144 Firewall: Configure Customized Services ...........................................................................

255

 

Figure 145 Firewall Example: Rules .....................................................................................................

256

 

Figure 146 Edit Custom Port Example .................................................................................................

256

 

Figure 147 Firewall Example: Edit Rule: Destination Address ............................................................

257

 

Figure 148 Firewall Example: Edit Rule: Select Customized Services .................................................

258

 

Figure 149 Firewall Example: Rules: MyService .................................................................................

259

 

Figure 150 Firewall: Threshold .............................................................................................................

261

 

Figure 151 Content Filter: Keyword ......................................................................................................

265

 

Figure 152 Content Filter: Schedule .....................................................................................................

266

 

Figure 153 Content Filter: Trusted ........................................................................................................

267

 

Figure 154 Encryption and Decryption .................................................................................................

270

 

Figure 155 IPSec Architecture ..............................................................................................................

271

 

Figure 156 Transport and Tunnel Mode IPSec Encapsulation .............................................................

272

 

Figure 157 IPSec Summary Fields .......................................................................................................

277

 

Figure 158 VPN Setup ..........................................................................................................................

278

 

Figure 159 NAT Router Between IPSec Routers .................................................................................

280

 

Figure 160 VPN Host using Intranet DNS Server Example ..................................................................

281

 

Figure 161 Edit VPN Policies ..............................................................................................................

284

 

Figure 162 Two Phases to Set Up the IPSec SA .................................................................................

288

 

Figure 163 Advanced VPN Policies ......................................................................................................

290

 

Figure 164 VPN: Manual Key ...............................................................................................................

293

 

Figure 165 VPN: SA Monitor ................................................................................................................

296

 

Figure 166 VPN: Global Setting ...........................................................................................................

297

 

Figure 167 Telecommuters Sharing One VPN Rule Example ..............................................................

298

 

 

 

 

28

 

 

 

 

P-2602HWLNI User’s Guide