List of Figures
Figure 82 Firewall Example: Edit Rule: Destination Address ..............................................................
154
Figure 83 Firewall Example: Edit Rule: Select Customized Services ...................................................
155
Figure 84 Firewall Example: Rules: MyService ...................................................................................
156
Figure 85 Security > Firewall > General ...............................................................................................
Figure 86 Security > Firewall > Rules ..................................................................................................
158
Figure 87 Security > Firewall > Rules: Edit ..........................................................................................
160
Figure 88 Security > Firewall > Rules: Edit: Edit Customized Services ...............................................
162
Figure 89 Security > Firewall > Rules: Edit: Edit Customized Services: Config ...................................
163
Figure 90 Three-Way Handshake .........................................................................................................
164
Figure 91 Security > Firewall > Threshold ............................................................................................
165
Figure 92 Ideal Firewall Setup ..............................................................................................................
169
Figure 93 “Triangle Route” Problem .....................................................................................................
Figure 94 IP Alias .................................................................................................................................
170
Figure 95 Security > Content Filter > Keyword: Example .....................................................................
172
Figure 96 Security > Content Filter > Schedule: Example ....................................................................
Figure 97 Security > Content Filter > Trusted: Example .......................................................................
173
Figure 98 Security > Content Filtering > Keyword ................................................................................
Figure 99 Security > Content Filter > Schedule ....................................................................................
174
Figure 100 Security > Content Filter: Trusted .......................................................................................
175
Figure 101 Security > Packet Filter ......................................................................................................
178
Figure 102 Security > Packet Filter > Edit (Protocol Filter) ..................................................................
179
Figure 103 Security > Packet Filter > Edit (Protocol Filter) > Edit Rule ................................................
180
Figure 104 Security > Packet Filter > Edit (Generic Filter) ...................................................................
181
Figure 105 Security > Packet Filter > Edit (Generic Filter) > Edit Rule ................................................
182
Figure 106 Protocol and Generic Filter Sets ........................................................................................
183
Figure 107 Certificates Example ..........................................................................................................
187
Figure 108 My Certificates ...................................................................................................................
188
Figure 109 My Certificate Import ..........................................................................................................
190
Figure 110 My Certificate Create ..........................................................................................................
191
Figure 111 My Certificate Details ..........................................................................................................
194
Figure 112 Trusted CAs ........................................................................................................................
196
Figure 113 Trusted CA Import ..............................................................................................................
198
Figure 114 Trusted CA Details ..............................................................................................................
199
Figure 115 Trusted Remote Hosts ........................................................................................................
202
Figure 116 Trusted Remote Host Import ..............................................................................................
203
Figure 117 Trusted Remote Host Details ..............................................................................................
204
Figure 118 Directory Servers ................................................................................................................
206
Figure 119 Directory Server Add and Edit ............................................................................................
207
Figure 120 Remote Host Certificates ...................................................................................................
210
Figure 121 Certificate Details ..............................................................................................................
Figure 122 Example of Static Routing Topology ...................................................................................
213
Figure 123 Advanced > Static Route ....................................................................................................
214
Figure 124 Advanced > Static Route: Edit ............................................................................................
215
P-660HN-F1 User’s Guide
23