Technical information
Watson-SHDSL-Router-GUI-Manual.doc
Version 2.3-03
Watson SHDSL Router
Web-based Management Manual
Revision: 2012-02-29
1-5
Figure 8-42: Add Traffic Priority Rule ............................................................................................... 8-42
Figure 8-43: Set DSCP Rule ............................................................................................................ 8-43
Figure 8-44: Set Priority with Queueing ............................................................................................ 8-43
Figure 8-45: Traffic Shaping ............................................................................................................. 8-45
Figure 8-46: Edit Device Traffic Shaping .......................................................................................... 8-46
Figure 8-47: TCP Serialization – Maximum Delay............................................................................ 8-47
Figure 8-48: Add Shaping Class....................................................................................................... 8-47
Figure 8-49: Edit Shaping Class ....................................................................................................... 8-48
Figure 8-50: Specify Maximum Bandwidth ....................................................................................... 8-48
Figure 8-51: Hierarchical Tocken Bucket ......................................................................................... 8-49
Figure 8-52: Add Policing Class ....................................................................................................... 8-50
Figure 8-53: Edit Policing Class ....................................................................................................... 8-50
Figure 8-54: Specify Maximum Bandwidth ....................................................................................... 8-50
Figure 8-55: DSCP–Traffic Priority Matching ................................................................................... 8-51
Figure 8-56: Edit DSCP Settings ...................................................................................................... 8-52
Figure 8-57: Traffic Queuing in 802.1p Settings ............................................................................... 8-52
Figure 8-58: Class Statistics ............................................................................................................. 8-53
Figure 8-59: Internet Protocol Security (IPSec) ................................................................................ 8-54
Figure 8-60: Internet Protocol Security (IPSec) Settings .................................................................. 8-55
Figure 8-61: IPSec Log Settings....................................................................................................... 8-56
Figure 8-62: VPN IPSec Properties – General ................................................................................. 8-57
Figure 8-63: VPN IPSec Properties – Settings ................................................................................. 8-57
Figure 8-64: VPN IPSec Properties – Routing ................................................................................. 8-58
Figure 8-65: VPN IPSec Properties – IPSec .................................................................................... 8-58
Figure 8-66: Automatic Key Exchange Settings ............................................................................... 8-61
Figure 8-67: Manual Key Definition .................................................................................................. 8-63
Figure 8-68: Network Connections ................................................................................................... 8-64
Figure 8-69: Connection Wizard ....................................................................................................... 8-64
Figure 8-70: Connect to a Virtual Private Network over the Internet ................................................ 8-65
Figure 8-71: VPN Client or Point-To-Point ....................................................................................... 8-65
Figure 8-72: Internet Protocol Security (IPSec) ................................................................................ 8-66
Figure 8-73: Connection Summary .................................................................................................. 8-66
Figure 8-74: New VPN IPSec Connection ........................................................................................ 8-67
Figure 8-75: Local Security Settings ................................................................................................. 8-67
Figure 8-76: IP Security Policy Wizard ............................................................................................. 8-68
Figure 8-77: IP Security Policy Name ............................................................................................... 8-68
Figure 8-78: Requests for Secure Communication .......................................................................... 8-69
Figure 8-79: Completing the IP Security Policy Wizard .................................................................... 8-69
Figure 8-80: Watson Connection Properties .................................................................................... 8-70
Figure 8-81: New Rule Properties .................................................................................................... 8-70
Figure 8-82: IP Filter List .................................................................................................................. 8-71
Figure 8-83: Filter Properties ............................................................................................................ 8-71
Figure 8-84: Windows XP to Watson Filter Properties ..................................................................... 8-72
Figure 8-85: IP Filter List .................................................................................................................. 8-73
Figure 8-86: Filter Action .................................................................................................................. 8-73
Figure 8-87: Require Security Properties ......................................................................................... 8-74
Figure 8-88: Edit Authentication Method Properties ......................................................................... 8-74
Figure 8-89: Tunnel Setting .............................................................................................................. 8-75
Figure 8-90: IP Filter List .................................................................................................................. 8-75
Figure 8-91: Tunnel Setting .............................................................................................................. 8-76
Figure 8-92: Watson Connection Properties .................................................................................... 8-76