List of Tables
Table 39 Network > Wireless LAN > WDS ..........................................................................................
120
Table 40 Network > Wireless LAN > QoS ............................................................................................
Table 41 Network > Wireless LAN > QoS ............................................................................................
121
Table 42 Additional Wireless Terms .....................................................................................................
123
Table 43 Types of Encryption for Each Type of Authentication ...........................................................
125
Table 44 Network > NAT > General .....................................................................................................
137
Table 45 Network > NAT > Port Forwarding ........................................................................................
139
Table 46 Network > NAT > Port Forwarding: Edit ................................................................................
140
Table 47 Network > NAT > Address Mapping ......................................................................................
141
Table 48 Network > NAT > Address Mapping: Edit .............................................................................
142
Table 49 Network > NAT > ALG ..........................................................................................................
143
Table 50 NAT Definitions .....................................................................................................................
144
Table 51 NAT Mapping Types ..............................................................................................................
147
Table 52 Security > Firewall > General ................................................................................................
157
Table 53 Security > Firewall > Rules ...................................................................................................
158
Table 54 Security > Firewall > Rules: Edit ...........................................................................................
160
Table 55 Security > Firewall > Rules: Edit: Edit Customized Services ................................................
162
Table 56 Security > Firewall > Rules: Edit: Edit Customized Services: Config ....................................
163
Table 57 Security > Firewall > Threshold ............................................................................................
165
Table 58 Security > Content Filtering > Keyword ................................................................................
173
Table 59 Security > Content Filter: Schedule ......................................................................................
174
Table 60 Security > Content Filter: Trusted .........................................................................................
175
Table 61 Security > Packet Filter .........................................................................................................
178
Table 62 Security > Packet Filter > Edit (Protocol Filter) .....................................................................
179
Table 63 Security > Packet Filter > Edit (Protocol Filter) > Edit Rule ..................................................
180
Table 64 Security > Packet Filter > Edit (Generic Filter) ......................................................................
182
Table 65 Security > Packet Filter > Edit (Generic Filter) > Edit Rule ...................................................
Table 66 My Certificates ......................................................................................................................
189
Table 67 My Certificate Import .............................................................................................................
191
Table 68 My Certificate Create ............................................................................................................
Table 69 My Certificate Details ............................................................................................................
194
Table 70 Trusted CAs ..........................................................................................................................
197
Table 71 Trusted CA Import .................................................................................................................
198
Table 72 Trusted CA Details ................................................................................................................
199
Table 73 Trusted Remote Hosts ..........................................................................................................
202
Table 74 Trusted Remote Host Import .................................................................................................
203
Table 75 Trusted Remote Host Details ................................................................................................
204
Table 76 Directory Servers ..................................................................................................................
206
Table 77 Directory Server Add and Edit ..............................................................................................
207
Table 78 Advanced > Static Route .......................................................................................................
214
Table 79 Advanced > Static Route: Edit ..............................................................................................
215
Table 80 Advanced > 802.1Q/1P > Group Setting ..............................................................................
222
Table 81 Advanced > 802.1Q/1P > Group Setting > Edit ....................................................................
223
28
P-660HN-F1 User’s Guide