List of Tables
Table 82 VoIP > Trunking > General ....................................................................................................
215
Table 83 VoIP > Trunking > Peer Call ..................................................................................................
216
Table 84 VoIP > Trunking > Call Rule ..................................................................................................
218
Table 85 VoIP Trunking Call Progression ............................................................................................
221
Table 86 PSTN to PSTN: VoIP Trunking Call Progression ..................................................................
225
Table 87 Common IP Ports ..................................................................................................................
235
Table 88 ICMP Commands That Trigger Alerts ...................................................................................
238
Table 89 Legal NetBIOS Commands ...................................................................................................
Table 90 Legal SMTP Commands ......................................................................................................
Table 91 Firewall: General ...................................................................................................................
249
Table 92 Firewall Rules .......................................................................................................................
250
Table 93 Firewall: Edit Rule .................................................................................................................
252
Table 94 Customized Services ............................................................................................................
254
Table 95 Firewall: Configure Customized Services .............................................................................
255
Table 96 Firewall: Threshold ................................................................................................................
261
Table 97 Sys Firewall Commands .......................................................................................................
262
Table 98 Content Filter: Keyword ........................................................................................................
266
Table 99 Content Filter: Schedule .......................................................................................................
267
Table 100 Content Filter: Trusted ........................................................................................................
Table 101 VPN and NAT ......................................................................................................................
273
Table 102 AH and ESP ........................................................................................................................
276
Table 103 VPN Setup ..........................................................................................................................
278
Table 104 VPN and NAT ......................................................................................................................
280
Table 105 Local ID Type and Content Fields .......................................................................................
282
Table 106 Peer ID Type and Content Fields ........................................................................................
Table 107 Matching ID Type and Content Configuration Example ......................................................
Table 108 Mismatching ID Type and Content Configuration Example ................................................
283
Table 109 Edit VPN Policies ................................................................................................................
284
Table 110 Advanced VPN Policies ......................................................................................................
290
Table 111 VPN: Manual Key ................................................................................................................
293
Table 112 VPN: SA Monitor .................................................................................................................
296
Table 113 VPN: Global Setting ............................................................................................................
297
Table 114 Telecommuters Sharing One VPN Rule Example ...............................................................
298
Table 115 Telecommuters Using Unique VPN Rules Example ............................................................
299
Table 116 My Certificates ....................................................................................................................
303
Table 117 My Certificate Import ...........................................................................................................
305
Table 118 My Certificate Create ..........................................................................................................
306
Table 119 My Certificate Details ..........................................................................................................
310
Table 120 Trusted CAs ........................................................................................................................
312
Table 121 Trusted CA Import ...............................................................................................................
313
Table 122 Trusted CA Details ..............................................................................................................
315
Table 123 Trusted Remote Hosts ........................................................................................................
317
Table 124 Trusted Remote Host Import ...............................................................................................
319
P-2602HWLNI User’s Guide
35