List of Figures
Figure 82 LAN IP Alias .........................................................................................................................
125
Figure 83 Example of a Wireless Network ...........................................................................................
127
Figure 84 Wireless LAN: General ........................................................................................................
130
Figure 85 Wireless: No Security ...........................................................................................................
132
Figure 86 Wireless: Static WEP Encryption ..........................................................................................
133
Figure 87 Wireless: WPA-PSK/WPA2-PSK ..........................................................................................
134
Figure 88 Wireless: WPA/WPA2 ...........................................................................................................
135
Figure 89 Advanced .............................................................................................................................
137
Figure 90 MAC Address Filter ..............................................................................................................
138
Figure 91 Example WPS Process: PIN Method ...................................................................................
141
Figure 92 How WPS works ...................................................................................................................
142
Figure 93 WPS: Example Network Step 1 ............................................................................................
143
Figure 94 WPS: Example Network Step 2 ............................................................................................
Figure 95 WPS: Example Network Step 3 ............................................................................................
144
Figure 96 Network > Wireless LAN > WPS ..........................................................................................
145
Figure 97 Network > Wireless LAN > WPS Station ..............................................................................
146
Figure 98 How NAT Works ...................................................................................................................
148
Figure 99 NAT Application With IP Alias ..............................................................................................
149
Figure 100 NAT General ......................................................................................................................
150
Figure 101 Multiple Servers Behind NAT Example ..............................................................................
153
Figure 102 NAT Port Forwarding ..........................................................................................................
Figure 103 Port Forwarding Rule Setup .............................................................................................
154
Figure 104 Firewall Application ............................................................................................................
161
Figure 105 Three-Way Handshake .......................................................................................................
162
Figure 106 SYN Flood ..........................................................................................................................
163
Figure 107 Smurf Attack .......................................................................................................................
Figure 108 Stateful Inspection ..............................................................................................................
165
Figure 109 Ideal Setup .........................................................................................................................
170
Figure 110 “Triangle Route” Problem ...................................................................................................
171
Figure 111 IP Alias ................................................................................................................................
Figure 112 Firewall: General ................................................................................................................
176
Figure 113 Firewall Rules ....................................................................................................................
178
Figure 114 Firewall: Edit Rule ...............................................................................................................
180
Figure 115 Firewall: Customized Services ...........................................................................................
182
Figure 116 Firewall: Configure Customized Services ...........................................................................
183
Figure 117 Firewall Example: Rules .....................................................................................................
184
Figure 118 Edit Custom Port Example .................................................................................................
Figure 119 Firewall Example: Edit Rule: Destination Address ............................................................
185
Figure 120 Firewall Example: Edit Rule: Select Customized Services .................................................
186
Figure 121 Firewall Example: Rules: MyService .................................................................................
187
Figure 122 Firewall: Anti Probing .........................................................................................................
189
Figure 123 Firewall: Threshold .............................................................................................................
192
Figure 124 Content Filter: Keyword ......................................................................................................
196
P-660HW-Tx v3 User’s Guide
23