List of Figures

Figure 82 Firewall Example: Edit Rule: Destination Address ..............................................................

154

Figure 83 Firewall Example: Edit Rule: Select Customized Services ...................................................

155

Figure 84 Firewall Example: Rules: MyService ...................................................................................

156

Figure 85 Security > Firewall > General ...............................................................................................

156

Figure 86 Security > Firewall > Rules ..................................................................................................

158

Figure 87 Security > Firewall > Rules: Edit ..........................................................................................

160

Figure 88 Security > Firewall > Rules: Edit: Edit Customized Services ...............................................

162

Figure 89 Security > Firewall > Rules: Edit: Edit Customized Services: Config ...................................

163

Figure 90 Three-Way Handshake .........................................................................................................

164

Figure 91 Security > Firewall > Threshold ............................................................................................

165

Figure 92 Ideal Firewall Setup ..............................................................................................................

169

Figure 93 “Triangle Route” Problem .....................................................................................................

169

Figure 94 IP Alias .................................................................................................................................

170

Figure 95 Security > Content Filter > Keyword: Example .....................................................................

172

Figure 96 Security > Content Filter > Schedule: Example ....................................................................

172

Figure 97 Security > Content Filter > Trusted: Example .......................................................................

173

Figure 98 Security > Content Filtering > Keyword ................................................................................

173

Figure 99 Security > Content Filter > Schedule ....................................................................................

174

Figure 100 Security > Content Filter: Trusted .......................................................................................

175

Figure 101 Security > Packet Filter ......................................................................................................

178

Figure 102 Security > Packet Filter > Edit (Protocol Filter) ..................................................................

179

Figure 103 Security > Packet Filter > Edit (Protocol Filter) > Edit Rule ................................................

180

Figure 104 Security > Packet Filter > Edit (Generic Filter) ...................................................................

181

Figure 105 Security > Packet Filter > Edit (Generic Filter) > Edit Rule ................................................

182

Figure 106 Protocol and Generic Filter Sets ........................................................................................

183

Figure 107 Certificates Example ..........................................................................................................

187

Figure 108 My Certificates ...................................................................................................................

188

Figure 109 My Certificate Import ..........................................................................................................

190

Figure 110 My Certificate Create ..........................................................................................................

191

Figure 111 My Certificate Details ..........................................................................................................

194

Figure 112 Trusted CAs ........................................................................................................................

196

Figure 113 Trusted CA Import ..............................................................................................................

198

Figure 114 Trusted CA Details ..............................................................................................................

199

Figure 115 Trusted Remote Hosts ........................................................................................................

202

Figure 116 Trusted Remote Host Import ..............................................................................................

203

Figure 117 Trusted Remote Host Details ..............................................................................................

204

Figure 118 Directory Servers ................................................................................................................

206

Figure 119 Directory Server Add and Edit ............................................................................................

207

Figure 120 Remote Host Certificates ...................................................................................................

210

Figure 121 Certificate Details ..............................................................................................................

210

Figure 122 Example of Static Routing Topology ...................................................................................

213

Figure 123 Advanced > Static Route ....................................................................................................

214

Figure 124 Advanced > Static Route: Edit ............................................................................................

215

P-660HN-F1 User’s Guide

23