List of Figures
Figure 168 Telecommuters Using Unique VPN Rules Example ...........................................................
299
Figure 169 Certificate Configuration Overview .....................................................................................
302
Figure 170 My Certificates ...................................................................................................................
303
Figure 171 My Certificate Import ..........................................................................................................
305
Figure 172 My Certificate Create ..........................................................................................................
306
Figure 173 My Certificate Details .........................................................................................................
309
Figure 174 Trusted CAs ........................................................................................................................
312
Figure 175 Trusted CA Import ..............................................................................................................
313
Figure 176 Trusted CA Details .............................................................................................................
314
Figure 177 Trusted Remote Hosts ........................................................................................................
317
Figure 178 Remote Host Certificates ...................................................................................................
318
Figure 179 Certificate Details ..............................................................................................................
Figure 180 Trusted Remote Host Import ..............................................................................................
319
Figure 181 Trusted Remote Host Details .............................................................................................
320
Figure 182 Directory Servers ................................................................................................................
323
Figure 183 Directory Server Add and Edit ............................................................................................
324
Figure 184 Example of Static Routing Topology ...................................................................................
327
Figure 185 Static Route ........................................................................................................................
328
Figure 186 Static Route Edit .................................................................................................................
329
Figure 187 Subnet-based Bandwidth Management Example ..............................................................
332
Figure 188 Bandwidth Management: General ......................................................................................
333
Figure 189 Bandwidth Management: Rule Setup .................................................................................
334
Figure 190 Bandwidth Management Rule Configuration ......................................................................
335
Figure 191 Bandwidth Management: Monitor ......................................................................................
337
Figure 192 Dynamic DNS .....................................................................................................................
340
Figure 193 Secure and Insecure Remote Management From the WAN ..............................................
343
Figure 194 HTTPS Implementation ......................................................................................................
345
Figure 195 Remote Management: HTTP .............................................................................................
346
Figure 196 Telnet Configuration on a TCP/IP Network .........................................................................
347
Figure 197 Remote Management: Telnet .............................................................................................
348
Figure 198 Remote Management: FTP ................................................................................................
349
Figure 199 SNMP Management Model ................................................................................................
350
Figure 200 Remote Management: SNMP ............................................................................................
351
Figure 201 Remote Management: DNS ...............................................................................................
353
Figure 202 Remote Management: ICMP ..............................................................................................
354
Figure 203 SSH Communication Over the WAN Example ..................................................................
355
Figure 204 How SSH Works .................................................................................................................
Figure 205 ADVANCED > REMOTE MGMT > SSH .............................................................................
356
Figure 206 SSH Example 1: Store Host Key ........................................................................................
357
Figure 207 SSH Example 2: Test ........................................................................................................
358
Figure 208 SSH Example 2: Log in ......................................................................................................
Figure 209 Secure FTP: Firmware Upload Example ............................................................................
359
Figure 210 Configuring UPnP ...............................................................................................................
362
P-2602HWLNI User’s Guide
29