ZyXEL p-660hwp Guia Do Utilizador

Página de 402
List of Tables
P-660HWP-Dx User’s Guide
36
Table 39 MAC Address Filter  ............................................................................................................... 127
Table 40 WMM QoS Priorities   ............................................................................................................. 128
Table 41 Commonly Used Services  ..................................................................................................... 129
Table 42 Wireless Lan: QoS   ................................................................................................................ 131
Table 43 Application Priority Configuration  .......................................................................................... 132
Table 44 Network > Powerline > Local Setting    ................................................................................... 138
Table 45 Network > Powerline > Remote Setting     ............................................................................. 139
Table 46 Network > Powerline > Status   .............................................................................................. 140
Table 47 NAT Definitions   ..................................................................................................................... 143
Table 48 NAT Mapping Types  .............................................................................................................. 146
Table 49 NAT General   ......................................................................................................................... 147
Table 50 Services and Port Numbers   .................................................................................................. 148
Table 51 NAT Port Forwarding   ............................................................................................................ 150
Table 52 Port Forwarding Rule Setup  .................................................................................................. 151
Table 53 Address Mapping Rules  ........................................................................................................ 152
Table 54 Edit Address Mapping Rule   .................................................................................................. 153
Table 55 Common IP Ports  .................................................................................................................. 159
Table 56 ICMP Commands That Trigger Alerts   ................................................................................... 162
Table 57 Legal NetBIOS Commands  ................................................................................................... 162
Table 58 Legal SMTP Commands  ....................................................................................................... 162
Table 59 Firewall: General  ................................................................................................................... 173
Table 60 Firewall Rules   ....................................................................................................................... 174
Table 61 Firewall: Edit Rule   ................................................................................................................. 177
Table 62 Customized Services   ............................................................................................................ 178
Table 63 Firewall: Configure Customized Services  ............................................................................. 179
Table 64 Predefined Services  .............................................................................................................. 183
Table 65 Firewall: Anti Probing   ............................................................................................................ 186
Table 66 Firewall: Threshold  ................................................................................................................ 188
Table 67 Content Filter: Keyword   ........................................................................................................ 192
Table 68 Content Filter: Schedule   ....................................................................................................... 193
Table 69 Content Filter: Trusted   .......................................................................................................... 193
Table 70 Security > Certificates > My Certificates   ............................................................................... 198
Table 71 Security > Certificates > My Certificates > Edit  ..................................................................... 200
Table 72 Security > Certificates > My Certificates > Details   ................................................................ 200
Table 73 Security > Certificates > My Certificates > Create   ................................................................ 203
Table 74 Security > Certificates > My Certificates > Import  ................................................................. 205
Table 75 Security > Certificates > Trusted CAs   ................................................................................... 206
Table 76 Security > Certificates > Trusted CAs > Details   .................................................................... 208
Table 77  Security > Certificates > Trusted CAs Import  ....................................................................... 210
Table 78 Security > Certificates > Trusted Remote Hosts   ....................................................................211
Table 79 Security > Certificates > Trusted Remote Hosts > Import  ..................................................... 212
Table 80 Security > Certificates > Trusted Remote Hosts > Details   .................................................... 213
Table 81 Security > Certificates > Directory Servers   ........................................................................... 215