Prestige 334W User’s Guide

Figure 28-10 NAT Example 1 ....................................................................................................................

28-10

Figure 28-11 Menu 4 Internet Access & NAT Example..............................................................................

28-11

Figure 28-12 NAT Example 2 .....................................................................................................................

28-11

Figure 28-13 Menu 15.2.1 Specifying an Inside Server.............................................................................

28-12

Figure 28-14 NAT Example 3 ....................................................................................................................

28-13

Figure 28-15 Example 3: Menu 11.3..........................................................................................................

28-14

Figure 28-16 Example 3: Menu 15.1.1.1 ...................................................................................................

28-14

Figure 28-17 Example 3: Final Menu 15.1.1 .............................................................................................

28-15

Figure 28-18 NAT Example 4 ....................................................................................................................

28-16

Figure 28-19 Example 4: Menu 15.1.1.1 Address Mapping Rule..............................................................

28-17

Figure 28-20 Example 4: Menu 15.1.1 Address Mapping Rules ...............................................................

28-17

Figure 28-21 Menu 15.3 Trigger Port Setup ..............................................................................................

28-18

Figure 29-1 Menu 21.2 Firewall Setup ........................................................................................................

29-2

Figure 30-1 Outgoing Packet Filtering Process ...........................................................................................

30-2

Figure 30-2 Filter Rule Process....................................................................................................................

30-3

Figure 30-4 Menu 21: Filter and Firewall Setup..........................................................................................

30-4

Figure 30-5 Menu 21.1: Filter Set Configuration.........................................................................................

30-4

Figure 30-6 Menu 21.1.1.1 TCP/IP Filter Rule............................................................................................

30-7

Figure 30-7 Executing an IP Filter.............................................................................................................

30-10

Figure 30-8 Menu 21.1.4.1 Generic Filter Rule..........................................................................................

30-11

Figure 30-9 Telnet Filter Example .............................................................................................................

30-13

Figure 30-10 Example Filter: Menu 21.1.3.1.............................................................................................

30-14

Figure 30-11 Example Filter Rules Summary: Menu 21.1.3......................................................................

30-15

Figure 30-12 Protocol and Device Filter Sets ............................................................................................

30-16

Figure 30-13 Filtering LAN Traffic ...........................................................................................................

30-17

Figure 30-14 Filtering Remote Node Traffic .............................................................................................

30-18

Figure 31-1 SNMP Management Model ......................................................................................................

31-1

Figure 31-2 Menu 22 SNMP Configuration.................................................................................................

31-3

Figure 32-1 Menu 23 System Security.........................................................................................................

32-1

Figure 32-2 Menu 23 System Security.........................................................................................................

32-1

Figure 32-3 Menu 23.2 System Security : RADIUS Server ........................................................................

32-2

Figure 32-4 Menu 23 System Security.........................................................................................................

32-3

Figure 32-5 Menu 23.4 System Security : IEEE802.1x ...............................................................................

32-4

Figure 33-1 Menu 24 System Maintenance .................................................................................................

33-1

Figure 33-2 Menu 24.1 System Maintenance : Status..................................................................................

33-2

Figure 33-3 Menu 24.2 System Information and Console Port Speed.........................................................

33-3

Figure 33-4 Menu 24.2.1 System Maintenance : Information .....................................................................

33-4

Figure 33-5 Menu 24.2.2 System Maintenance : Change Console Port Speed............................................

33-5

Figure 33-6 Menu 24.3.2 System Maintenance : Syslog Logging ...............................................................

33-5

Figure 33-7 Call-Triggering Packet Example ..............................................................................................

33-9

Figure 33-8 Menu 24.4 System Maintenance : Diagnostic ........................................................................

33-10

List of Figures

xxv