List of Tables

Table 82 VoIP > Trunking > General ....................................................................................................

215

Table 83 VoIP > Trunking > Peer Call ..................................................................................................

216

Table 84 VoIP > Trunking > Call Rule ..................................................................................................

218

Table 85 VoIP Trunking Call Progression ............................................................................................

221

Table 86 PSTN to PSTN: VoIP Trunking Call Progression ..................................................................

225

Table 87 Common IP Ports ..................................................................................................................

235

Table 88 ICMP Commands That Trigger Alerts ...................................................................................

238

Table 89 Legal NetBIOS Commands ...................................................................................................

238

Table 90 Legal SMTP Commands ......................................................................................................

238

Table 91 Firewall: General ...................................................................................................................

249

Table 92 Firewall Rules .......................................................................................................................

250

Table 93 Firewall: Edit Rule .................................................................................................................

252

Table 94 Customized Services ............................................................................................................

254

Table 95 Firewall: Configure Customized Services .............................................................................

255

Table 96 Firewall: Threshold ................................................................................................................

261

Table 97 Sys Firewall Commands .......................................................................................................

262

Table 98 Content Filter: Keyword ........................................................................................................

266

Table 99 Content Filter: Schedule .......................................................................................................

267

Table 100 Content Filter: Trusted ........................................................................................................

267

Table 101 VPN and NAT ......................................................................................................................

273

Table 102 AH and ESP ........................................................................................................................

276

Table 103 VPN Setup ..........................................................................................................................

278

Table 104 VPN and NAT ......................................................................................................................

280

Table 105 Local ID Type and Content Fields .......................................................................................

282

Table 106 Peer ID Type and Content Fields ........................................................................................

282

Table 107 Matching ID Type and Content Configuration Example ......................................................

282

Table 108 Mismatching ID Type and Content Configuration Example ................................................

283

Table 109 Edit VPN Policies ................................................................................................................

284

Table 110 Advanced VPN Policies ......................................................................................................

290

Table 111 VPN: Manual Key ................................................................................................................

293

Table 112 VPN: SA Monitor .................................................................................................................

296

Table 113 VPN: Global Setting ............................................................................................................

297

Table 114 Telecommuters Sharing One VPN Rule Example ...............................................................

298

Table 115 Telecommuters Using Unique VPN Rules Example ............................................................

299

Table 116 My Certificates ....................................................................................................................

303

Table 117 My Certificate Import ...........................................................................................................

305

Table 118 My Certificate Create ..........................................................................................................

306

Table 119 My Certificate Details ..........................................................................................................

310

Table 120 Trusted CAs ........................................................................................................................

312

Table 121 Trusted CA Import ...............................................................................................................

313

Table 122 Trusted CA Details ..............................................................................................................

315

Table 123 Trusted Remote Hosts ........................................................................................................

317

Table 124 Trusted Remote Host Import ...............................................................................................

319

P-2602HWLNI User’s Guide

35