List of Tables
P-660HWP-Dx User’s Guide
36
Table 39 MAC Address Filter ............................................................................................................... 127
Table 40 WMM QoS Priorities ........................................................................ .....................................128
Table 41 Commonly Used Services ..................................................................................................... 129
Table 42 Wireless Lan: QoS ................................................................................................................ 131
Table 43 Application Priority Configuration .......................................................................................... 132
Table 44 Network > Powerline > Local Setting ................................................................................... 138
Table 45 Network > Powerline > Remote Setting ............................................................................. 139
Table 46 Network > Powerline > Status .............................................................................................. 140
Table 47 NAT Definitions ..................................................................................................................... 143
Table 48 NAT Mapping Types ..............................................................................................................146
Table 49 NAT General ......................................................................................................................... 1 47
Table 50 Services and Port Numbers .................................................................................................. 148
Table 51 NAT Port Forwarding ................................................................................. ...........................150
Table 52 Port Forwarding Rule Setup .................................................................................................. 151
Table 53 Address Mapping Rules ........................................................................................................ 152
Table 54 Edit Address Mapping Rule ....................................................... ........................................... 153
Table 55 Common IP Ports .................................................................................................................. 159
Table 56 ICMP Commands That Trigger Alerts ................................................................................... 162
Table 57 Legal NetBIOS Commands ................................................................................................... 162
Table 58 Legal SMTP Commands ....................................................................................................... 162
Table 59 Firewall: General ................................................................................................................... 173
Table 60 Firewall Rules .................................................................. ..................................................... 174
Table 61 Firewall: Edit Rule ................................................................................................................. 1 77
Table 62 Customized Services ................................................................................. ...........................178
Table 63 Firewall: Configure Customized Services ............................................................................. 179
Table 64 Predefined Services .............................................................................................................. 183
Table 65 Firewall: Anti Probing ............................................................................................................ 186
Table 66 Firewall: Threshold ................................................................................................................ 188
Table 67 Content Filter: Keyword ............................................. ........................................................... 192
Table 68 Content Filter: Schedule ............................................ ........................................................... 193
Table 69 Content Filter: Trusted ............................................................................... ...........................193
Table 70 Security > Certificates > My Certificates ............................................................................... 198
Table 71 Security > Certificates > My Certificates > Edit .....................................................................200
Table 72 Security > Certificates > My Certificates > Details ................................................................ 200
Table 73 Security > Certificates > My Certificates > Create ................................................................ 203
Table 74 Security > Certificates > My Certificates > Import ................................................................. 205
Table 75 Security > Certificates > Trusted CAs ................................................................................... 206
Table 76 Security > Certificates > Trusted CAs > Details .................................................................... 208
Table 77 Security > Certificates > Trusted CAs Import ....................................................................... 210
Table 78 Security > Certificates > Trusted Remote Hosts ....................................................................211
Table 79 Security > Certificates > Trusted Remote Hosts > Import ..................................................... 212
Table 80 Security > Certificates > Trusted Remote Hosts > Details .................................................... 213
Table 81 Security > Certificates > Directory Servers ........................................................................... 215