
Prestige 652 Series User’s Guide
List of Figures xv
Figure 8-5 Edit SUA/NAT Server Set .......................................................................................................... 8-10
Figure 8-6 Address Mapping Rules...............................................................................................................8-11
Figure 8-7 Address Mapping Rule Edit........................................................................................................ 8-13
Figure 9-1 DDNS........................................................................................................................................... 9-2
Figure 10-1 Time/Date ................................................................................................................................. 10-1
Figure 11-1 Prestige Firewall Application ....................................................................................................11-3
Figure 11-2 Three-Way Handshake...............................................................................................................11-5
Figure 11-3 SYN Flood.................................................................................................................................11-5
Figure 11-4 Smurf Attack..............................................................................................................................11-6
Figure 11-5 Stateful Inspection .....................................................................................................................11-8
Figure 12-1 Enabling the Firewall ............................................................................................................... 12-1
Figure 12-2 Attack Alert .............................................................................................................................. 12-4
Figure 13-1 LAN to WAN Traffic................................................................................................................ 13-3
Figure 13-2 WAN to LAN Traffic................................................................................................................ 13-4
Figure 13-3 Firewall Rules Summary: First Screen..................................................................................... 13-5
Figure 13-4 Creating/Editing A Firewall Rule ........................................................................................... 13-10
Figure 13-5 Adding/Editing Source and Destination Addresses ................................................................ 13-12
Figure 13-6 Timeout................................................................................................................................... 13-13
Figure 14-1 Customized Services ................................................................................................................ 14-1
Figure 14-2 Creating/Editing A Customized Service ................................................................................... 14-2
Figure 14-3 Configure Source IP Example .................................................................................................. 14-4
Figure 14-4 Customized Service for MyService Example........................................................................... 14-4
Figure 14-5 Syslog Rule Configuration Example ........................................................................................ 14-5
Figure 14-6 Rule Summary Example........................................................................................................... 14-6
Figure 15-1 Content Filter: Keyword........................................................................................................... 15-2
Figure 15-2 Content Filter: Schedule........................................................................................................... 15-3
Figure 15-3 Content Filter: Trusted.............................................................................................................. 15-4
Figure 16-1 Encryption and Decryption....................................................................................................... 16-2
Figure 16-2 VPN Application ...................................................................................................................... 16-3
Figure 16-3 IPSec Architecture.................................................................................................................... 16-4
Figure 16-4 Transport and Tunnel Mode IPSec Encapsulation.................................................................... 16-5
Figure 17-1 IPSec Summary Fields ............................................................................................................. 17-3
Figure 17-2 VPN Summary ......................................................................................................................... 17-4
Figure 17-3 VPN IKE .................................................................................................................................. 17-8
Figure 17-4 Two Phases to Set Up the IPSec SA....................................................................................... 17-13
Figure 17-5 VPN IKE: Advanced .............................................................................................................. 17-15
Figure 17-6 Manual Setup.......................................................................................................................... 17-19
Figure 17-7 SA Monitor............................................................................................................................. 17-23
Figure 17-8 Global Setting......................................................................................................................... 17-24
Figure 17-9 Telecommuters Sharing One VPN Rule Example .................................................................. 17-26
Figure 17-10 Telecommuters Using Unique VPN Rules Example ............................................................ 17-27