ZyXEL Communications 652 User Manual
Prestige 652 ADSL Security Router
List of Figures
xiv
Figure 8-11 Menu 15.2.1 — NAT Server Setup ...........................................................................................8-18
Figure 8-12 Multiple Servers Behind NAT Example....................................................................................8-19
Figure 8-13 NAT Example 1.........................................................................................................................8-20
Figure 8-14 Menu 4 — Internet Access & NAT Example ............................................................................8-21
Figure 8-15 NAT Example 2.........................................................................................................................8-22
Figure 8-16 Menu 15.2.1 — Specifying an Inside Server ............................................................................8-23
Figure 8-17 NAT Example 3.........................................................................................................................8-25
Figure 8-18 Example 3: Menu 11.3 ..............................................................................................................8-26
Figure 8-19 Example 3: Menu 15.1.1.1 ........................................................................................................8-26
Figure 8-20 Example 3: Final Menu 15.1.1..................................................................................................8-27
Figure 8-21 NAT Example 4.........................................................................................................................8-29
Figure 8-22 Example 4: Menu 15.1.1.1 — Address Mapping Rule..............................................................8-29
Figure 8-23 Example 4: Menu 15.1.1 — Address Mapping Rules ..............................................................8-30
Figure 9-1 Prestige Firewall Application........................................................................................................9-3
Figure 9-2 Three-Way Handshake ..................................................................................................................9-5
Figure 9-3 SYN Flood ....................................................................................................................................9-5
Figure 9-4 Smurf Attack .................................................................................................................................9-6
Figure 9-5 Stateful Inspection.........................................................................................................................9-8
Figure 10-1 Menu 21 — Filter and Firewall Setup.......................................................................................10-1
Figure 10-2 Menu 21.2 — Firewall Setup ....................................................................................................10-2
Figure 10-3 Example Firewall Log...............................................................................................................10-2
Figure 11-1 Enabling the Firewall ................................................................................................................11-2
Figure 11-2 E-mail Screen ............................................................................................................................11-3
Figure 11-3 E-mail Log ................................................................................................................................11-6
Figure 11-4 Attack Alert ...............................................................................................................................11-8
Figure 12-1 LAN to WAN Traffic.................................................................................................................12-3
Figure 12-2 WAN to LAN Traffic.................................................................................................................12-4