Prestige 334W User’s Guide

Figure 8-6 Wireless: WPA-PSK....................................................................................................................

8-11

Figure 8-7 WPA with RADIUS Application Example..................................................................................

8-14

Figure 8-8 Wireless: WPA ............................................................................................................................

8-15

Figure 8-9 Wireless: 802.1x and Dynamic WEP ..........................................................................................

8-18

Figure 8-10 Wireless: 802.1x and Static WEP..............................................................................................

8-20

Figure 8-11 Wireless: 802.1x........................................................................................................................

8-23

Figure 8-12 MAC Address Filter ..................................................................................................................

8-26

Figure 8-13 Local User Database .................................................................................................................

8-28

Figure 8-14 EAP Authentication...................................................................................................................

8-30

Figure 8-15 RADIUS....................................................................................................................................

8-31

Figure 9-1 WAN: Route....................................................................................................................................

9-2

Figure 9-2 Ethernet Encapsulation ....................................................................................................................

9-3

Figure 9-3 PPPoE Encapsulation.......................................................................................................................

9-5

Figure 9-4 PPTP Encapsulation.........................................................................................................................

9-6

Figure 9-5 WAN: IP .........................................................................................................................................

9-8

Figure 9-6 MAC Setup ...................................................................................................................................

9-11

Figure 9-7 Traffic Redirect WAN Setup .......................................................................................................

9-12

Figure 9-8 Traffic Redirect LAN Setup ........................................................................................................

9-12

Figure 9-9 WAN: Traffic Redirect...................................................................................................................

9-13

Figure 10-1 How NAT Works.......................................................................................................................

10-3

Figure 10-2 NAT Application With IP Alias .................................................................................................

10-4

Figure 10-3 Multiple Servers Behind NAT Example....................................................................................

10-8

Figure 10-4 SUA/NAT Setup........................................................................................................................

10-9

Figure 10-5 Address Mapping ....................................................................................................................

10-11

Figure 10-6 Address Mapping Edit.............................................................................................................

10-12

Figure 10-7 Trigger Port Forwarding Process: Example ............................................................................

10-14

Figure 10-8 Trigger Port .............................................................................................................................

10-15

Figure 11-1 Example of Static Routing Topology ........................................................................................

11-1

Figure 11-2 Static Route ...............................................................................................................................

11-2

Figure 11-3 Static Route: Edit ......................................................................................................................

11-3

Figure 12-1 Configuring UPnP.....................................................................................................................

12-3

Figure 13-1 Firewall: Settings ......................................................................................................................

13-3

Figure 13-2 Firewall Rule Directions ...........................................................................................................

13-5

Figure 13-3 Firewall: Filter...........................................................................................................................

13-7

Figure 13-4 Firewall: Service .......................................................................................................................

13-9

Figure 14-1 Remote Management: WWW ...................................................................................................

14-3

Figure 14-2 Telnet Configuration on a TCP/IP Network ..............................................................................

14-4

Figure 14-3 Remote Management: Telnet.....................................................................................................

14-5

Figure 14-4 Remote Management: FTP .......................................................................................................

14-6

Figure 14-5 SNMP Management Model.......................................................................................................

14-8

Figure 14-6 Remote Management: SNMP..................................................................................................

14-10

xxii

List of Figures