Wireless Firewall Router User's Guide

P-335 Series User’s Guide
23 List of Figures
Figure 37 Wireless ............................................................................................................. 85
Figure 38 Wireless: No Security .......................................................................................... 86
Figure 39 Wireless: Static WEP Encryption ........................................................................ 87
Figure 40 WPA(2)-PSK Authentication ............................................................................... 88
Figure 41 Wireless: WPA-PSK ............................................................................................ 89
Figure 42 WPA(2) with RADIUS Application Example ........................................................ 90
Figure 43 Wireless: WPA .................................................................................................... 91
Figure 44 Wireless: 802.1x and Dynamic WEP .................................................................. 93
Figure 45 Wireless: 802.1x and Static WEP ....................................................................... 95
Figure 46 Wireless: 802.1x ................................................................................................. 97
Figure 47 OTIST ................................................................................................................. 99
Figure 48 OTIST Start ......................................................................................................... 100
Figure 49 OTIST Process ................................................................................................... 100
Figure 50 MAC Address Filter ............................................................................................. 101
Figure 51 Advanced ............................................................................................................ 102
Figure 52 QoS ..................................................................................................................... 106
Figure 53 Application Priority Configuration ........................................................................ 107
Figure 54 Ethernet Encapsulation ....................................................................................... 111
Figure 55 PPPoE Encapsulation ......................................................................................... 113
Figure 56 PPTP Encapsulation ........................................................................................... 115
Figure 57 Advanced ............................................................................................................ 117
Figure 58 Traffic Redirect WAN Setup ................................................................................ 118
Figure 59 Traffic Redirect LAN Setup ................................................................................. 119
Figure 60 WAN: Traffic Redirect .......................................................................................... 119
Figure 61 Any IP Example Application ................................................................................ 124
Figure 62 LAN IP ................................................................................................................. 126
Figure 63 IP Alias ................................................................................................................ 127
Figure 64 Advanced ............................................................................................................ 128
Figure 65 General ............................................................................................................... 130
Figure 66 Static DHCP ........................................................................................................ 132
Figure 67 Client List ............................................................................................................ 133
Figure 68 How NAT Works .................................................................................................. 136
Figure 69 NAT Application With IP Alias ............................................................................. 136
Figure 70 Multiple Servers Behind NAT Example ............................................................... 140
Figure 71 General ............................................................................................................... 140
Figure 72 Port Forwarding .................................................................................................. 141
Figure 73 Rule Setup .......................................................................................................... 142
Figure 74 Trigger Port Forwarding Process: Example ........................................................ 143
Figure 75 Trigger Port .........................................................................................................145
Figure 76 General ............................................................................................................... 148
Figure 77 Services .............................................................................................................. 149
Figure 78 Content Filter Disabled ....................................................................................... 152
Figure 79 Filter .................................................................................................................... 153