
List of Figures
P-660HWP-Dx User’s Guide 37
Figure 82 Network > Powerline > Remote Setting ............................................................................... 139
Figure 83 Network > Powerline > Status ...................................... ........................................................ 140
Figure 84 How NAT Works ..................................................................................... ..............................144
Figure 85 NAT Application With IP Alias .................. ............................................................................ 145
Figure 86 NAT General ........................................................................................................................ 147
Figure 87 Multiple Servers Behind NAT Example .............. .................................................................. 149
Figure 88 NAT Port Forwarding ............................................................................................................ 150
Figure 89 Port Forwarding Rule Setup ..................................................................... ...........................1 51
Figure 90 Address Mapping Rules ..................... .................................................................................. 152
Figure 91 Edit Address Mapping Rule ......................................................................................... ........153
Figure 92 Firewall Application ......... ..................................................................................................... 159
Figure 93 Three-Way Handshake ......................................................................................................... 160
Figure 94 SYN Flood .................................................................... ........................................................ 161
Figure 95 Smurf Attack .................................................................................... .....................................161
Figure 96 Stateful Inspection ..................................................................................... ...........................1 63
Figure 97 Firewall: General ...................... ............................................................................................ 172
Figure 98 Firewall Rules ................................................................................................. .....................174
Figure 99 Firewall: Edit Rule ................................................................................................................ 176
Figure 100 Firewall: Customized Services ...................... ..................................................................... 178
Figure 101 Firewall: Configure Customized Services ........................................................................... 179
Figure 102 Firewall Example: Rules ..................................................................................................... 180
Figure 103 Edit Custom Port Example ......................... ........................................................................ 180
Figure 104 Firewall Example: Edit Rule: Destination Address .... ........................................................ 181
Figure 105 Firewall Example: Edit Rule: Select Customized Services ................................................. 182
Figure 106 Firewall Example: Rules: MyService ............................................... ..................................183
Figure 107 Firewall: Anti Probing ......................................................................................................... 185
Figure 108 Firewall: Threshold ........................................................ ..................................................... 188
Figure 109 Content Filter: Keyword ..................................................................................... .................191
Figure 110 Content Filter: Schedule ................................................................................ .....................192
Figure 111 Content Filter: Trusted ........................................................................................................193
Figure 112 Certificates on Your Computer ............................................................................................196
Figure 113 Certificate Details ............................................................................................................... 197
Figure 114 Certificate Configuration Overview ................................................................................ .....197
Figure 115 Security > Certificates > My Certificates ............................................................................ 198
Figure 116 Security > Certificates > My Certificates > Create .............................................................. 202
Figure 117 Security > Certificates > My Certificates > Import ......... ..................................................... 205
Figure 118 Security > Certificates > Trusted CAs ................................................................................. 206
Figure 119 Security > Certificates > Trusted CAs > Details .................................................................. 207
Figure 120 Security > Certificates > Trusted CAs > Import ............................................. .....................210
Figure 121 Security > Certificates > Trusted Remote Hosts ..... ........................................................... 210
Figure 122 Security > Certificates > Trusted Remote Hosts > Import .......................................... ........212
Figure 123 Security > Certificates > Trusted Remote Hosts > Details ............... .................................. 213
Figure 124 Security > Certificates > Directory Servers ........................................................................ 215