User`s guide

List of Figures
P-2602HWUDL-D User’s Guide
29
Figure 168 PSTN to PSTN Example: General Configuration ............................................................... 233
Figure 169 PSTN to PSTN Example - Outgoing Authentication From Device B .................................. 233
Figure 170 PSTN to PSTN Example - Call Rule .................................................................................. 234
Figure 171 PSTN to PSTN Example - Incoming Authentication To Device C ...................................... 234
Figure 172 Default Firewall Action ........................................................................................................ 242
Figure 173 Ideal Firewall Setup ............................................................................................................ 244
Figure 174 “Triangle Route” Problem ................................................................................................... 245
Figure 175 IP Alias ............................................................................................................................... 246
Figure 176 Firewall: General ................................................................................................................ 246
Figure 177 Firewall Rules .................................................................................................................... 248
Figure 178 Firewall: Edit Rule .............................................................................................................. 250
Figure 179 Firewall: Customized Services ........................................................................................... 252
Figure 180 Firewall: Configure Customized Services ........................................................................... 253
Figure 181 Firewall Example: Rules ..................................................................................................... 254
Figure 182 Edit Custom Port Example ................................................................................................. 254
Figure 183 Firewall Example: Edit Rule: Destination Address ............................................................ 255
Figure 184 Firewall Example: Edit Rule: Select Customized Services ................................................. 256
Figure 185 Firewall Example: Rules: MyService .................................................................................257
Figure 186 Three-Way Handshake ....................................................................................................... 257
Figure 187 Firewall: Threshold ............................................................................................................. 258
Figure 188 Content Filter: Keyword ...................................................................................................... 261
Figure 189 Content Filter: Schedule ..................................................................................................... 262
Figure 190 Content Filter: Trusted ........................................................................................................ 263
Figure 191 Encryption and Decryption ................................................................................................. 266
Figure 192 IPSec Architecture .............................................................................................................. 267
Figure 193 Transport and Tunnel Mode IPSec Encapsulation ............................................................. 268
Figure 194 IPSec Summary Fields ....................................................................................................... 273
Figure 195 VPN Setup .......................................................................................................................... 274
Figure 196 NAT Router Between IPSec Routers ................................................................................. 276
Figure 197 VPN Host using Intranet DNS Server Example .................................................................. 277
Figure 198 VPN Setup: Edit ................................................................................................................ 280
Figure 199 Two Phases to Set Up the IPSec SA ................................................................................. 284
Figure 200 Advanced VPN IKE ........................................................................................................... 286
Figure 201 VPN Setup: Manual Key ..................................................................................................... 289
Figure 202 VPN: SA Monitor ................................................................................................................ 292
Figure 203 VPN: Global Setting ........................................................................................................... 293
Figure 204 Telecommuters Sharing One VPN Rule Example .............................................................. 294
Figure 205 Telecommuters Using Unique VPN Rules Example ........................................................... 295
Figure 206 Certificate Configuration Overview ..................................................................................... 298
Figure 207 My Certificates ................................................................................................................... 299
Figure 208 My Certificate Import .......................................................................................................... 301
Figure 209 My Certificate Create .......................................................................................................... 302
Figure 210 My Certificate Details ......................................................................................................... 305