List of Figures

Figure 168 Telecommuters Using Unique VPN Rules Example ...........................................................

299

Figure 169 Certificate Configuration Overview .....................................................................................

302

Figure 170 My Certificates ...................................................................................................................

303

Figure 171 My Certificate Import ..........................................................................................................

305

Figure 172 My Certificate Create ..........................................................................................................

306

Figure 173 My Certificate Details .........................................................................................................

309

Figure 174 Trusted CAs ........................................................................................................................

312

Figure 175 Trusted CA Import ..............................................................................................................

313

Figure 176 Trusted CA Details .............................................................................................................

314

Figure 177 Trusted Remote Hosts ........................................................................................................

317

Figure 178 Remote Host Certificates ...................................................................................................

318

Figure 179 Certificate Details ..............................................................................................................

318

Figure 180 Trusted Remote Host Import ..............................................................................................

319

Figure 181 Trusted Remote Host Details .............................................................................................

320

Figure 182 Directory Servers ................................................................................................................

323

Figure 183 Directory Server Add and Edit ............................................................................................

324

Figure 184 Example of Static Routing Topology ...................................................................................

327

Figure 185 Static Route ........................................................................................................................

328

Figure 186 Static Route Edit .................................................................................................................

329

Figure 187 Subnet-based Bandwidth Management Example ..............................................................

332

Figure 188 Bandwidth Management: General ......................................................................................

333

Figure 189 Bandwidth Management: Rule Setup .................................................................................

334

Figure 190 Bandwidth Management Rule Configuration ......................................................................

335

Figure 191 Bandwidth Management: Monitor ......................................................................................

337

Figure 192 Dynamic DNS .....................................................................................................................

340

Figure 193 Secure and Insecure Remote Management From the WAN ..............................................

343

Figure 194 HTTPS Implementation ......................................................................................................

345

Figure 195 Remote Management: HTTP .............................................................................................

346

Figure 196 Telnet Configuration on a TCP/IP Network .........................................................................

347

Figure 197 Remote Management: Telnet .............................................................................................

348

Figure 198 Remote Management: FTP ................................................................................................

349

Figure 199 SNMP Management Model ................................................................................................

350

Figure 200 Remote Management: SNMP ............................................................................................

351

Figure 201 Remote Management: DNS ...............................................................................................

353

Figure 202 Remote Management: ICMP ..............................................................................................

354

Figure 203 SSH Communication Over the WAN Example ..................................................................

355

Figure 204 How SSH Works .................................................................................................................

355

Figure 205 ADVANCED > REMOTE MGMT > SSH .............................................................................

356

Figure 206 SSH Example 1: Store Host Key ........................................................................................

357

Figure 207 SSH Example 2: Test ........................................................................................................

358

Figure 208 SSH Example 2: Log in ......................................................................................................

358

Figure 209 Secure FTP: Firmware Upload Example ............................................................................

359

Figure 210 Configuring UPnP ...............................................................................................................

362

P-2602HWLNI User’s Guide

29