ZyAIR Wireless Gateway Series User’s Guide

Figure 8-2 Service Type ..................................................................................................................................

8-2

Figure 8-3 PPPoE Encapsulation......................................................................................................................

8-4

Figure 8-4 PPTP Encapsulation........................................................................................................................

8-6

Figure 8-5 IP Setup..........................................................................................................................................

8-8

Figure 8-6 MAC Setup ...................................................................................................................................

8-11

Figure 9-1 How NAT Works ..........................................................................................................................

9-3

Figure 9-2 NAT Application with IP Alias .....................................................................................................

9-4

Figure 9-3 Multiple Servers Behind NAT Example .......................................................................................

9-7

Figure 9-4 SUA/NAT Setup ...........................................................................................................................

9-8

Figure 9-5 Address Mapping........................................................................................................................

9-10

Figure 9-6 Address Mapping Rule ................................................................................................................

9-11

Figure 10-1 Example of Static Routing Topology........................................................................................

10-1

Figure 10-2 IP Static Route Summary..........................................................................................................

10-2

Figure 10-3 Edit IP Static Route ..................................................................................................................

10-3

Figure 11-1 Firewall Application ..................................................................................................................

11-3

Figure 11-2 Three-Way Handshake...............................................................................................................

11-4

Figure 11-3 SYN Flood.................................................................................................................................

11-5

Figure 11-4 Smurf Attack..............................................................................................................................

11-6

Figure 11-5 Stateful Inspection .....................................................................................................................

11-8

Figure 12-1 LAN to WAN Traffic................................................................................................................

12-5

Figure 12-2 WAN to LAN Traffic................................................................................................................

12-6

Figure 12-3 Firewall Settings.......................................................................................................................

12-7

Figure 12-4 Firewall Filter...........................................................................................................................

12-9

Figure 12-5 Firewall Services .....................................................................................................................

12-11

Figure 13-1 Telnet Configuration on a TCP/IP Network .............................................................................

13-2

Figure 13-2 Telnet........................................................................................................................................

13-3

Figure 13-3 FTP...........................................................................................................................................

13-4

Figure 13-4 WWW.......................................................................................................................................

13-5

Figure 13-5 SNMP Management Model ......................................................................................................

13-7

Figure 13-6 SNMP.......................................................................................................................................

13-9

Figure 13-7 DNS.........................................................................................................................................

13-11

Figure 13-8 Security...................................................................................................................................

13-12

Figure 14-1 Configuring UPnP ....................................................................................................................

14-3

Figure 15-1 View Log ..................................................................................................................................

15-2

Figure 15-2 Log Settings..............................................................................................................................

15-4

Figure 15-3 Reports .....................................................................................................................................

15-7

Figure 15-4 Protocol/Port Report.................................................................................................................

15-9

Figure 15-5 LAN IP Address Report..........................................................................................................

15-10

Figure 16-1 Status ........................................................................................................................................

16-1

Figure 16-2 Status: Show Statistics..............................................................................................................

16-3

Figure 16-3 DHCP Table..............................................................................................................................

16-4

List of Figures

xvii