Руководство Пользователя для ZyXEL p-660h-61
Prestige 660H Series User’s Guide
xii
List of Figures
List of Figures
Figure 1-1 Prestige Internet Access Application ................................................................................. 1-5
Figure 1-2 Firewall Application........................................................................................................... 1-6
Figure 1-3 Prestige LAN-to-LAN Application.................................................................................... 1-6
Figure 2-1 Password Screen................................................................................................................. 2-1
Figure 2-2 Web Configurator SITE MAP Screen................................................................................ 2-2
Figure 3-1 Wizard Screen 1 ................................................................................................................. 3-2
Figure 3-2 Internet Connection with PPPoE........................................................................................ 3-5
Figure 3-3 Internet Connection with RFC 1483 .................................................................................. 3-6
Figure 3-4 Internet Connection with ENET ENCAP........................................................................... 3-7
Figure 3-5 Internet Connection with PPPoA ....................................................................................... 3-8
Figure 3-6 Wizard Screen 3 ............................................................................................................... 3-10
Figure 3-7 Wizard: LAN Configuration ............................................................................................ 3-10
Figure 3-8 Wizard Screen 4 ............................................................................................................... 3-12
Figure 4-1 Password ............................................................................................................................ 4-1
Figure 5-1 LAN and WAN IP Addresses ............................................................................................ 5-1
Figure 5-2 LAN Setup ......................................................................................................................... 5-4
Figure 6-1 Example of Traffic Shaping ............................................................................................... 6-2
Figure 6-2 WAN Setup (PPPoE) ......................................................................................................... 6-3
Figure 6-3 Traffic Redirect Example ................................................................................................... 6-6
Figure 6-4 Traffic Redirect LAN Setup............................................................................................... 6-6
Figure 6-5 WAN Backup ..................................................................................................................... 6-7
Figure 7-1 How NAT Works ............................................................................................................... 7-2
Figure 7-2 NAT Application With IP Alias......................................................................................... 7-3
Figure 7-3 Multiple Servers Behind NAT Example ............................................................................ 7-5
Figure 7-4 NAT Mode ......................................................................................................................... 7-6
Figure 7-5 Edit SUA/NAT Server Set ................................................................................................. 7-7
Figure 7-6 Address Mapping Rules ..................................................................................................... 7-8
Figure 7-7 Address Mapping Rule Edit ............................................................................................... 7-9
Figure 8-1 Dynamic DNS .................................................................................................................... 8-1
Figure 9-1 Time and Date .................................................................................................................... 9-3
Figure 10-1 Prestige Firewall Application......................................................................................... 10-2
Figure 10-2 Three-Way Handshake................................................................................................... 10-4
Figure 10-3 SYN Flood ..................................................................................................................... 10-4
Figure 10-4 Smurf Attack .................................................................................................................. 10-5
Figure 10-5 Stateful Inspection.......................................................................................................... 10-6
Figure 11-1 Enabling the Firewall ..................................................................................................... 11-1
Figure 11-2 Alert................................................................................................................................ 11-3
Figure 12-1 LAN to WAN Traffic..................................................................................................... 12-3
Figure 12-2 WAN to LAN Traffic..................................................................................................... 12-3
Figure 12-3 Firewall Rules Summary: First Screen........................................................................... 12-4
Figure 12-4 Creating/Editing A Firewall Rule .................................................................................. 12-8
Figure 12-5 Adding/Editing Source and Destination Addresses ....................................................... 12-9
Figure 12-6 Timeout ........................................................................................................................ 12-10
Figure 13-1 Customized Services ...................................................................................................... 13-1
Figure 13-2 Creating/Editing A Customized Service ........................................................................ 13-2
Figure 13-3 Edit Rule Example ......................................................................................................... 13-3
Figure 13-4 Configure Source IP Example........................................................................................ 13-3
Figure 13-5 Customized Service for MyService Example ................................................................ 13-4