ZyXEL p-660hwp Manuale Utente

Pagina di 402
 List of Figures
P-660HWP-Dx User’s Guide
37
Figure 82 Network > Powerline > Remote Setting  ............................................................................... 139
Figure 83 Network > Powerline > Status  .............................................................................................. 140
Figure 84 How NAT Works  ................................................................................................................... 144
Figure 85 NAT Application With IP Alias  .............................................................................................. 145
Figure 86 NAT General  ........................................................................................................................ 147
Figure 87 Multiple Servers Behind NAT Example  ................................................................................ 149
Figure 88 NAT Port Forwarding ............................................................................................................ 150
Figure 89 Port Forwarding Rule Setup   ................................................................................................ 151
Figure 90 Address Mapping Rules  ....................................................................................................... 152
Figure 91 Edit Address Mapping Rule  ................................................................................................. 153
Figure 92 Firewall Application  .............................................................................................................. 159
Figure 93 Three-Way Handshake ......................................................................................................... 160
Figure 94 SYN Flood  ............................................................................................................................ 161
Figure 95 Smurf Attack ......................................................................................................................... 161
Figure 96 Stateful Inspection  ................................................................................................................ 163
Figure 97 Firewall: General  .................................................................................................................. 172
Figure 98 Firewall Rules  ...................................................................................................................... 174
Figure 99 Firewall: Edit Rule  ................................................................................................................ 176
Figure 100 Firewall: Customized Services  ........................................................................................... 178
Figure 101 Firewall: Configure Customized Services ........................................................................... 179
Figure 102 Firewall Example: Rules ..................................................................................................... 180
Figure 103 Edit Custom Port Example  ................................................................................................. 180
Figure 104 Firewall Example: Edit Rule: Destination Address   ............................................................ 181
Figure 105 Firewall Example: Edit Rule: Select Customized Services ................................................. 182
Figure 106 Firewall Example: Rules: MyService   ................................................................................. 183
Figure 107 Firewall: Anti Probing  ......................................................................................................... 185
Figure 108 Firewall: Threshold  ............................................................................................................. 188
Figure 109 Content Filter: Keyword ...................................................................................................... 191
Figure 110 Content Filter: Schedule  ..................................................................................................... 192
Figure 111 Content Filter: Trusted ........................................................................................................ 193
Figure 112 Certificates on Your Computer ............................................................................................ 196
Figure 113 Certificate Details  ............................................................................................................... 197
Figure 114 Certificate Configuration Overview  ..................................................................................... 197
Figure 115 Security > Certificates > My Certificates  ............................................................................ 198
Figure 116 Security > Certificates > My Certificates > Create .............................................................. 202
Figure 117 Security > Certificates > My Certificates > Import  .............................................................. 205
Figure 118 Security > Certificates > Trusted CAs ................................................................................. 206
Figure 119 Security > Certificates > Trusted CAs > Details .................................................................. 207
Figure 120 Security > Certificates > Trusted CAs > Import  .................................................................. 210
Figure 121 Security > Certificates > Trusted Remote Hosts  ................................................................ 210
Figure 122 Security > Certificates > Trusted Remote Hosts > Import  .................................................. 212
Figure 123 Security > Certificates > Trusted Remote Hosts > Details  ................................................. 213
Figure 124 Security > Certificates > Directory Servers  ........................................................................ 215