ZyXEL p-660h-61 Guía Del Usuario
Prestige 660H Series User’s Guide
xvi
List of Tables
List of Tables
Table 2-1 Web Configurator Screens Summary .................................................................................. 2-2
Table 3-1 Wizard Screen 1 .................................................................................................................. 3-3
Table 3-2 Internet Connection with PPPoE ......................................................................................... 3-6
Table 3-3 Internet Connection with RFC 1483.................................................................................... 3-6
Table 3-4 Internet Connection with ENET ENCAP ............................................................................ 3-7
Table 3-5 Internet Connection with PPPoA......................................................................................... 3-8
Table 3-6 Wizard: LAN Configuration.............................................................................................. 3-10
Table 4-1 Password.............................................................................................................................. 4-1
Table 5-1 LAN Setup........................................................................................................................... 5-4
Table 6-1 WAN Setup ......................................................................................................................... 6-3
Table 6-2 WAN Backup ...................................................................................................................... 6-7
Table 7-1 NAT Definitions.................................................................................................................. 7-1
Table 7-2 NAT Mapping Types........................................................................................................... 7-3
Table 7-3 Services and Port Numbers.................................................................................................. 7-5
Table 7-4 NAT Mode........................................................................................................................... 7-6
Table 7-5 Edit SUA/NAT Server Set................................................................................................... 7-7
Table 7-6 Address Mapping Rules....................................................................................................... 7-8
Table 7-7 Address Mapping Rule Edit .............................................................................................. 7-10
Table 8-1 Dynamic DNS ..................................................................................................................... 8-2
Table 9-1 Time and Date ..................................................................................................................... 9-3
Table 10-1 Common IP Ports............................................................................................................. 10-3
Table 10-2 ICMP Commands That Trigger Alerts ............................................................................ 10-5
Table 10-3 Legal NetBIOS Commands ............................................................................................. 10-5
Table 10-4 Legal SMTP Commands ................................................................................................. 10-5
Table 11-1 Alert................................................................................................................................. 11-3
Table 12-1 Firewall Rules Summary: First Screen ............................................................................ 12-4
Table 12-2 Predefined Services ......................................................................................................... 12-5
Table 12-3 Creating/Editing A Firewall Rule.................................................................................... 12-8
Table 12-4 Adding/Editing Source and Destination Addresses......................................................... 12-9
Table 12-5 Timeout.......................................................................................................................... 12-10
Table 13-1 Customized Services........................................................................................................ 13-1
Table 13-2 Creating/Editing A Customized Service.......................................................................... 13-2
Table 14-1 Content Filter: Keyword.................................................................................................. 14-2
Table 14-2 Content Filter: Schedule .................................................................................................. 14-3
Table 14-3 Content Filter: Trusted..................................................................................................... 14-3
Table 15-1 Remote Management Control.......................................................................................... 15-3
Table 16-1 Configuring UPnP ........................................................................................................... 16-2
Table 17-1 Log Settings..................................................................................................................... 17-2
Table 17-2 View Logs ....................................................................................................................... 17-4
Table 17-3 SMTP Error Messages..................................................................................................... 17-5
Table 18-1 Application-based Bandwidth Management Example .................................................... 18-2
Table 18-2 Subnet-based Bandwidth Management Example ............................................................ 18-2
Table 18-3 Application and Subnet-based Bandwidth Management Example.................................. 18-2
Table 18-4 Application and Subnet-based Bandwidth Management Example.................................. 18-3
Table 18-5 Bandwidth Allotment Example ....................................................................................... 18-4
Table 18-6 Maximize Bandwidth Usage Example ............................................................................ 18-5
Table 18-7 Bandwidth Borrowing Example ...................................................................................... 18-6
Table 18-8 Bandwidth Manager: Summary....................................................................................... 18-7