Wireless Gateway Series User's Guide

ZyAIR Wireless Gateway Series User’s Guide
List of Figures xvii
Figure 8-2 Service Type .................................................................................................................................. 8-2
Figure 8-3 PPPoE Encapsulation...................................................................................................................... 8-4
Figure 8-4 PPTP Encapsulation........................................................................................................................ 8-6
Figure 8-5 IP Setup.......................................................................................................................................... 8-8
Figure 8-6 MAC Setup ...................................................................................................................................8-11
Figure 9-1 How NAT Works .......................................................................................................................... 9-3
Figure 9-2 NAT Application with IP Alias ..................................................................................................... 9-4
Figure 9-3 Multiple Servers Behind NAT Example ....................................................................................... 9-7
Figure 9-4 SUA/NAT Setup ........................................................................................................................... 9-8
Figure 9-5 Address Mapping........................................................................................................................ 9-10
Figure 9-6 Address Mapping Rule ................................................................................................................9-11
Figure 10-1 Example of Static Routing Topology........................................................................................ 10-1
Figure 10-2 IP Static Route Summary.......................................................................................................... 10-2
Figure 10-3 Edit IP Static Route .................................................................................................................. 10-3
Figure 11-1 Firewall Application ..................................................................................................................11-3
Figure 11-2 Three-Way Handshake...............................................................................................................11-4
Figure 11-3 SYN Flood.................................................................................................................................11-5
Figure 11-4 Smurf Attack..............................................................................................................................11-6
Figure 11-5 Stateful Inspection .....................................................................................................................11-8
Figure 12-1 LAN to WAN Traffic................................................................................................................ 12-5
Figure 12-2 WAN to LAN Traffic................................................................................................................ 12-6
Figure 12-3 Firewall Settings....................................................................................................................... 12-7
Figure 12-4 Firewall Filter........................................................................................................................... 12-9
Figure 12-5 Firewall Services .....................................................................................................................12-11
Figure 13-1 Telnet Configuration on a TCP/IP Network ............................................................................. 13-2
Figure 13-2 Telnet........................................................................................................................................ 13-3
Figure 13-3 FTP........................................................................................................................................... 13-4
Figure 13-4 WWW....................................................................................................................................... 13-5
Figure 13-5 SNMP Management Model ...................................................................................................... 13-7
Figure 13-6 SNMP....................................................................................................................................... 13-9
Figure 13-7 DNS.........................................................................................................................................13-11
Figure 13-8 Security................................................................................................................................... 13-12
Figure 14-1 Configuring UPnP .................................................................................................................... 14-3
Figure 15-1 View Log .................................................................................................................................. 15-2
Figure 15-2 Log Settings.............................................................................................................................. 15-4
Figure 15-3 Reports ..................................................................................................................................... 15-7
Figure 15-4 Protocol/Port Report................................................................................................................. 15-9
Figure 15-5 LAN IP Address Report.......................................................................................................... 15-10
Figure 16-1 Status ........................................................................................................................................ 16-1
Figure 16-2 Status: Show Statistics.............................................................................................................. 16-3
Figure 16-3 DHCP Table.............................................................................................................................. 16-4