ZyXEL p-660h-61 Betriebsanweisung

Seite von 354
Prestige 660H Series User’s Guide 
xii 
List of Figures 
List of Figures
 
 
Figure 1-1 Prestige Internet Access Application ................................................................................. 1-5 
Figure 1-2 Firewall Application........................................................................................................... 1-6 
Figure 1-3 Prestige LAN-to-LAN Application.................................................................................... 1-6 
Figure 2-1 Password Screen................................................................................................................. 2-1 
Figure 2-2 Web Configurator SITE MAP Screen................................................................................ 2-2 
Figure 3-1 Wizard Screen 1 ................................................................................................................. 3-2 
Figure 3-2 Internet Connection with PPPoE........................................................................................ 3-5 
Figure 3-3 Internet Connection with RFC 1483 .................................................................................. 3-6 
Figure 3-4 Internet Connection with ENET ENCAP........................................................................... 3-7 
Figure 3-5 Internet Connection with PPPoA ....................................................................................... 3-8 
Figure 3-6 Wizard Screen 3 ............................................................................................................... 3-10 
Figure 3-7 Wizard: LAN Configuration ............................................................................................ 3-10 
Figure 3-8 Wizard Screen 4 ............................................................................................................... 3-12 
Figure 4-1 Password ............................................................................................................................ 4-1 
Figure 5-1 LAN and WAN IP Addresses ............................................................................................ 5-1 
Figure 5-2 LAN Setup ......................................................................................................................... 5-4 
Figure 6-1 Example of Traffic Shaping ............................................................................................... 6-2 
Figure 6-2 WAN Setup (PPPoE) ......................................................................................................... 6-3 
Figure 6-3 Traffic Redirect Example ................................................................................................... 6-6 
Figure 6-4 Traffic Redirect LAN Setup............................................................................................... 6-6 
Figure 6-5 WAN Backup ..................................................................................................................... 6-7 
Figure 7-1 How NAT Works ............................................................................................................... 7-2 
Figure 7-2 NAT Application With IP Alias......................................................................................... 7-3 
Figure 7-3 Multiple Servers Behind NAT Example ............................................................................ 7-5 
Figure 7-4 NAT Mode ......................................................................................................................... 7-6 
Figure 7-5 Edit SUA/NAT Server Set ................................................................................................. 7-7 
Figure 7-6 Address Mapping Rules ..................................................................................................... 7-8 
Figure 7-7 Address Mapping Rule Edit ............................................................................................... 7-9 
Figure 8-1 Dynamic DNS .................................................................................................................... 8-1 
Figure 9-1 Time and Date .................................................................................................................... 9-3 
Figure 10-1 Prestige Firewall Application......................................................................................... 10-2 
Figure 10-2 Three-Way Handshake................................................................................................... 10-4 
Figure 10-3 SYN Flood ..................................................................................................................... 10-4 
Figure 10-4 Smurf Attack .................................................................................................................. 10-5 
Figure 10-5 Stateful Inspection.......................................................................................................... 10-6 
Figure 11-1 Enabling the Firewall ..................................................................................................... 11-1 
Figure 11-2 Alert................................................................................................................................ 11-3 
Figure 12-1 LAN to WAN Traffic..................................................................................................... 12-3 
Figure 12-2 WAN to LAN Traffic..................................................................................................... 12-3 
Figure 12-3 Firewall Rules Summary: First Screen........................................................................... 12-4 
Figure 12-4 Creating/Editing A Firewall Rule .................................................................................. 12-8 
Figure 12-5 Adding/Editing Source and Destination Addresses ....................................................... 12-9 
Figure 12-6 Timeout ........................................................................................................................ 12-10 
Figure 13-1 Customized Services ...................................................................................................... 13-1 
Figure 13-2 Creating/Editing A Customized Service ........................................................................ 13-2 
Figure 13-3 Edit Rule Example ......................................................................................................... 13-3 
Figure 13-4 Configure Source IP Example........................................................................................ 13-3 
Figure 13-5 Customized Service for MyService Example ................................................................ 13-4