Prestige 334W User’s Guide

Figure 14-7 Remote Management: DNS....................................................................................................

14-12

Figure 14-8 Security...................................................................................................................................

14-13

Figure 15-1 Encryption and Decryption.......................................................................................................

15-2

Figure 15-2 IPSec Architecture....................................................................................................................

15-3

Figure 15-3 Transport and Tunnel Mode IPSec Encapsulation....................................................................

15-4

Figure 16-1 IPSec Summary Fields .............................................................................................................

16-3

Figure 16-2 VPN: Summary ........................................................................................................................

16-4

Figure 16-3 NAT Router Between IPSec Routers........................................................................................

16-6

Figure 16-4 VPN Host using Intranet DNS Server Example .......................................................................

16-7

Figure 16-5 VPN: Rule Setup (Basic).........................................................................................................

16-11

Figure 16-6 Two Phases to Set Up the IPSec SA.......................................................................................

16-16

Figure 16-7 VPN IKE: Advanced ..............................................................................................................

16-19

Figure 16-8 Rule Setup: Manual ................................................................................................................

16-27

Figure 16-9 SA Monitor.............................................................................................................................

16-31

Figure 16-10 VPN: Global Setting.............................................................................................................

16-32

Figure 16-11 Telecommuters Sharing One VPN Rule Example ................................................................

16-34

Figure 16-12 Telecommuters Using Unique VPN Rules Example ............................................................

16-35

Figure 17-1 View Logs.................................................................................................................................

17-1

Figure 17-2 Log Settings..............................................................................................................................

17-3

Figure 18-1 Application-based Bandwidth Management Example..............................................................

18-2

Figure 18-2 Subnet-based Bandwidth Management Example .....................................................................

18-2

Figure 18-3 Application and Subnet-based Bandwidth Management Example...........................................

18-3

Figure 18-4 Bandwidth Usage Example ......................................................................................................

18-3

Figure 18-5 Maximize Bandwidth Usage Example .....................................................................................

18-4

Figure 18-6 Bandwidth Management Configuration ...................................................................................

18-9

Figure 18-7 Bandwidth Management Edit ..................................................................................................

18-11

Figure 18-8 Bandwidth Management Monitor...........................................................................................

18-14

Figure 19-1 Maintenance Status...................................................................................................................

19-1

Figure 19-2 Maintenance System Statistics .................................................................................................

19-3

Figure 19-3 Maintenance DHCP Table ........................................................................................................

19-4

Figure 19-4 Maintenance Any IP .................................................................................................................

19-5

Figure 19-5 Maintenance Association List...................................................................................................

19-6

Figure 19-6 Maintenance Firmware Upload ................................................................................................

19-6

Figure 19-7 Upload Warning........................................................................................................................

19-7

Figure 19-8 Network Temporarily Disconnected.........................................................................................

19-7

Figure 19-9 Upload Error Message..............................................................................................................

19-8

Figure 19-10 Maintenance Configuration ....................................................................................................

19-9

Figure 19-11 Configuration Restore Successful.........................................................................................

19-10

Figure 19-12 Temporarily Disconnected....................................................................................................

19-10

Figure 19-13 Configuration Restore Error ..................................................................................................

19-11

Figure 19-14 Factory Defaults ....................................................................................................................

19-11

List of Figures

xxiii