ZyXEL Communications 652 User Manual

Page of 331
Prestige 652 ADSL Security Router 
List of Figures 
xiv 
Figure 8-11 Menu 15.2.1 — NAT Server Setup ...........................................................................................8-18 
Figure 8-12 Multiple Servers Behind NAT Example....................................................................................8-19 
Figure 8-13 NAT Example 1.........................................................................................................................8-20 
Figure 8-14 Menu 4 — Internet Access & NAT Example ............................................................................8-21 
Figure 8-15 NAT Example 2.........................................................................................................................8-22 
Figure 8-16 Menu 15.2.1 — Specifying an Inside Server ............................................................................8-23 
Figure 8-17 NAT Example 3.........................................................................................................................8-25 
Figure 8-18 Example 3: Menu 11.3 ..............................................................................................................8-26 
Figure 8-19 Example 3: Menu 15.1.1.1 ........................................................................................................8-26 
Figure 8-20 Example 3: Final Menu 15.1.1..................................................................................................8-27 
Figure 8-21 NAT Example 4.........................................................................................................................8-29 
Figure 8-22 Example 4: Menu 15.1.1.1 — Address Mapping Rule..............................................................8-29 
 Figure 8-23 Example 4: Menu 15.1.1 — Address Mapping Rules ..............................................................8-30 
Figure 9-1 Prestige Firewall Application........................................................................................................9-3 
Figure 9-2 Three-Way Handshake ..................................................................................................................9-5 
Figure 9-3 SYN Flood ....................................................................................................................................9-5 
Figure 9-4 Smurf Attack .................................................................................................................................9-6 
Figure 9-5 Stateful Inspection.........................................................................................................................9-8 
Figure 10-1 Menu 21 — Filter and Firewall Setup.......................................................................................10-1 
Figure 10-2 Menu 21.2 — Firewall Setup ....................................................................................................10-2 
Figure 10-3 Example Firewall Log...............................................................................................................10-2 
Figure 11-1 Enabling the Firewall ................................................................................................................11-2 
Figure 11-2 E-mail Screen ............................................................................................................................11-3 
Figure 11-3 E-mail Log ................................................................................................................................11-6 
Figure 11-4 Attack Alert ...............................................................................................................................11-8 
Figure 12-1 LAN to WAN Traffic.................................................................................................................12-3 
Figure 12-2 WAN to LAN Traffic.................................................................................................................12-4