ZyXEL P-660HW-D1 사용자 가이드

다운로드
페이지 460
Prestige 660H/HW Series User’s Guide
25 
 
Figure 37 Example Wireless Client OTIST Screen ............................................................. 101
Figure 38 Security Key ........................................................................................................ 101
Figure 39 OTIST in Progress (Prestige) .............................................................................. 101
Figure 40 OTIST in Progress (Client) .................................................................................. 101
Figure 41 No AP with OTIST Found  ................................................................................... 102
Figure 42 Start OTIST?  ....................................................................................................... 102
Figure 43 Example of Traffic Shaping  ................................................................................. 106
Figure 44 WAN Setup (PPPoE)  .......................................................................................... 107
Figure 45 Traffic Redirect Example ..................................................................................... 110
Figure 46 Traffic Redirect LAN Setup  ................................................................................. 110
Figure 47 WAN Backup ....................................................................................................... 111
Figure 48 How NAT Works .................................................................................................. 116
Figure 49 NAT Application With IP Alias  ............................................................................. 116
Figure 50 Multiple Servers Behind NAT Example ............................................................... 119
Figure 51 NAT Mode  ........................................................................................................... 120
Figure 52 Edit SUA/NAT Server Set  ................................................................................... 121
Figure 53 Address Mapping Rules ...................................................................................... 122
Figure 54 Address Mapping Rule Edit  ................................................................................ 123
Figure 55 Dynamic DNS  ..................................................................................................... 127
Figure 56 Time and Date ..................................................................................................... 128
Figure 57 Prestige Firewall Application ............................................................................... 132
Figure 58 Three-Way Handshake ....................................................................................... 133
Figure 59 SYN Flood ........................................................................................................... 134
Figure 60 Smurf Attack  ....................................................................................................... 135
Figure 61 Stateful Inspection ............................................................................................... 137
Figure 62 LAN to WAN Traffic  ............................................................................................. 147
Figure 63 WAN to LAN Traffic ............................................................................................. 147
Figure 64 Firewall: Default Policy ........................................................................................ 148
Figure 65 Firewall: Rule Summary  ..................................................................................... 149
Figure 66 Firewall: Edit Rule ............................................................................................... 152
Figure 67 Firewall: Customized Services ............................................................................ 154
Figure 68 Firewall: Configure Customized Services  ........................................................... 155
Figure 69 Firewall Example: Rule Summary ....................................................................... 156
Figure 70 Firewall Example: Edit Rule: Destination Address  ............................................. 157
Figure 71 Edit Custom Port Example .................................................................................. 157
Figure 72 Firewall Example: Edit Rule: Select Customized Services ................................. 158
Figure 73 Firewall Example: Rule Summary: My Service   .................................................. 159
Figure 74 Firewall: Anti Probing .......................................................................................... 162
Figure 75 Firewall: Threshold .............................................................................................. 164
Figure 76 Content Filter: Keyword  ...................................................................................... 166
Figure 77 Content Filter: Schedule  ..................................................................................... 167
Figure 78 Content Filter: Trusted ........................................................................................ 168
Figure 79 Telnet Configuration on a TCP/IP Network  ......................................................... 171