Wireless Firewall Router User's Guide
P-335 Series User’s Guide
List of Figures 24
Figure 80 Schedule .............................................................................................................155
Figure 81 Encryption and Decryption .................................................................................. 159
Figure 82 IPSec Architecture .............................................................................................. 160
Figure 83 Transport and Tunnel Mode IPSec Encapsulation .............................................. 161
Figure 84 IPSec Summary Fields ....................................................................................... 166
Figure 85 Summary ............................................................................................................. 167
Figure 86 NAT Router Between IPSec Routers .................................................................. 168
Figure 87 VPN Host using Intranet DNS Server Example .................................................. 169
Figure 88 Mismatching ID Type and Content Configuration Example ................................ 171
Figure 89 Rule Setup .......................................................................................................... 172
Figure 90 Two Phases to Set Up the IPSec SA .................................................................. 175
Figure 91 Advanced Rule Setup ......................................................................................... 178
Figure 92 Rule Setup with Manual Key ............................................................................... 183
Figure 93 SA Monitor .......................................................................................................... 186
Figure 94 Global Setting ..................................................................................................... 187
Figure 95 Telecommuters Sharing One VPN Rule Example ............................................... 188
Figure 96 Telecommuters Using Unique VPN Rules Example ........................................... 189
Figure 97 TMSS First Time Access ..................................................................................... 190
Figure 98 Download ActiveX to View TMSS Web Page ..................................................... 191
Figure 99 TMSS Web Page(Dashboard) ............................................................................ 191
Figure 100 TMSS Service Summary ................................................................................... 191
Figure 101 TMSS 3 Steps ................................................................................................... 192
Figure 102 TMSS Registration Form .................................................................................. 192
Figure 103 Example TMSS Activated Service Summary Screen ....................................... 193
Figure 104 Example TMSS Activated Parental Controls Screen ........................................ 193
Figure 105 General .............................................................................................................194
Figure 106 Exception List .................................................................................................... 196
Figure 107 Virus Protection ................................................................................................. 197
Figure 108 Parental Controls .............................................................................................. 198
Figure 109 Example of Static Routing Topology ................................................................. 202
Figure 110 IP Static Route .................................................................................................. 203
Figure 111 Static Route Setup ............................................................................................. 204
Figure 112 Application-based Bandwidth Management Example ....................................... 207
Figure 113 Subnet-based Bandwidth Management Example ............................................. 207
Figure 114 Application and Subnet-based Bandwidth Management Example .................... 208
Figure 115 Bandwidth Usage Example ............................................................................... 209
Figure 116 Maximize Bandwidth Usage Example ............................................................... 210
Figure 117 Bandwidth Management Configuration ............................................................. 213
Figure 118 Bandwidth Management Rule and Filter Configuration ..................................... 215
Figure 119 WWW Remote Management ............................................................................ 219
Figure 120 Telnet Configuration on a TCP/IP Network ....................................................... 220
Figure 121 Telnet Remote Management ............................................................................. 221
Figure 122 FTP Remote Management ................................................................................ 222