ZyXEL Communications 650 Series User Manual

Page of 513
Prestige 650 Series User’s Guide 
xiv 
List of Figures 
List of Figures
 
Figure 1-1 Prestige Internet Access Application.............................................................................................1-8
 
Figure 1-2 Prestige LAN-to-LAN Application ...............................................................................................1-8
 
Figure 2-1 Password Screen ...........................................................................................................................2-1
 
Figure 2-2 Web Configurator SITE MAP Screen ...........................................................................................2-2
 
Figure 2-3 Password .......................................................................................................................................2-3
 
Figure 2-4 Example Xmodem Upload............................................................................................................2-5
 
Figure 3-1 Wizard Screen 1 ............................................................................................................................3-3
 
Figure 3-2 Internet Connection with PPPoA ..................................................................................................3-7
 
Figure 3-3 Internet Connection with RFC 1483 .............................................................................................3-9
 
Figure 3-4 Internet Connection with ENET ENCAP....................................................................................3-10
 
Figure 3-5 Internet Connection with PPPoE.................................................................................................3-11
 
Figure 3-6 Wizard Screen 3 ..........................................................................................................................3-13
 
Figure 3-7 Wizard : LAN Configuration.......................................................................................................3-14
 
Figure 3-8 Wizard Screen 4 ..........................................................................................................................3-15
 
Figure 4-1 LAN and WAN IP Addresses ........................................................................................................4-1
 
Figure 4-2 LAN ..............................................................................................................................................4-4
 
Figure 5-1 RTS/CTS .......................................................................................................................................5-2
 
Figure 5-2 Prestige Wireless Security Levels .................................................................................................5-3
 
Figure 5-3 Wireless.........................................................................................................................................5-5
 
Figure 5-4 MAC Address Filter ......................................................................................................................5-8
 
Figure 5-5 EAP Authentication.....................................................................................................................5-11
 
Figure 5-6 802.1x..........................................................................................................................................5-11
 
Figure 5-7 Local User Database ...................................................................................................................5-14
 
Figure 5-8 RADIUS......................................................................................................................................5-16
 
Figure 6-1 Example of Traffic Shaping ..........................................................................................................6-2
 
Figure 6-2 Internet Access Setup
.......................................................................................................................6-3
 
Figure 7-1 How NAT Works...........................................................................................................................7-2
 
Figure 7-2 NAT Application With IP Alias .....................................................................................................7-3
 
Figure 7-3 Multiple Servers Behind NAT Example........................................................................................7-7
 
Figure 7-4 NAT Mode.....................................................................................................................................7-7
 
Figure 7-5 Edit SUA/NAT Server Set.............................................................................................................7-9
 
Figure 7-6 Address Mapping Rules ..............................................................................................................7-11
 
Figure 7-7 Address Mapping Rule Edit ........................................................................................................7-12
 
Figure 8-1 DDNS............................................................................................................................................8-2
 
Figure 9-1 Time and Date ...............................................................................................................................9-1
 
Figure 10-1 Prestige Firewall Application....................................................................................................10-3
 
Figure 10-2 Three-Way Handshake ..............................................................................................................10-5
 
Figure 10-3 SYN Flood ................................................................................................................................10-5
 
Figure 10-4 Smurf Attack .............................................................................................................................10-6