User's Manual

List of Figures
P-660HN-F1 User’s Guide
23
Figure 82 Firewall Example: Edit Rule: Destination Address .............................................................. 154
Figure 83 Firewall Example: Edit Rule: Select Customized Services ................................................... 155
Figure 84 Firewall Example: Rules: MyService ................................................................................... 156
Figure 85 Security > Firewall > General ............................................................................................... 156
Figure 86 Security > Firewall > Rules .................................................................................................. 158
Figure 87 Security > Firewall > Rules: Edit .......................................................................................... 160
Figure 88 Security > Firewall > Rules: Edit: Edit Customized Services ............................................... 162
Figure 89 Security > Firewall > Rules: Edit: Edit Customized Services: Config ................................... 163
Figure 90 Three-Way Handshake ......................................................................................................... 164
Figure 91 Security > Firewall > Threshold ............................................................................................ 165
Figure 92 Ideal Firewall Setup .............................................................................................................. 169
Figure 93 “Triangle Route” Problem ..................................................................................................... 169
Figure 94 IP Alias ................................................................................................................................. 170
Figure 95 Security > Content Filter > Keyword: Example ..................................................................... 172
Figure 96 Security > Content Filter > Schedule: Example .................................................................... 172
Figure 97 Security > Content Filter > Trusted: Example ....................................................................... 173
Figure 98 Security > Content Filtering > Keyword ................................................................................ 173
Figure 99 Security > Content Filter > Schedule .................................................................................... 174
Figure 100 Security > Content Filter: Trusted ....................................................................................... 175
Figure 101 Security > Packet Filter ...................................................................................................... 178
Figure 102 Security > Packet Filter > Edit (Protocol Filter) .................................................................. 179
Figure 103 Security > Packet Filter > Edit (Protocol Filter) > Edit Rule ................................................ 180
Figure 104 Security > Packet Filter > Edit (Generic Filter) ................................................................... 181
Figure 105 Security > Packet Filter > Edit (Generic Filter) > Edit Rule ................................................ 182
Figure 106 Protocol and Generic Filter Sets ........................................................................................ 183
Figure 107 Certificates Example .......................................................................................................... 187
Figure 108 My Certificates ................................................................................................................... 188
Figure 109 My Certificate Import .......................................................................................................... 190
Figure 110 My Certificate Create .......................................................................................................... 191
Figure 111 My Certificate Details .......................................................................................................... 194
Figure 112 Trusted CAs ........................................................................................................................ 196
Figure 113 Trusted CA Import .............................................................................................................. 198
Figure 114 Trusted CA Details .............................................................................................................. 199
Figure 115 Trusted Remote Hosts ........................................................................................................ 202
Figure 116 Trusted Remote Host Import .............................................................................................. 203
Figure 117 Trusted Remote Host Details .............................................................................................. 204
Figure 118 Directory Servers ................................................................................................................ 206
Figure 119 Directory Server Add and Edit ............................................................................................ 207
Figure 120 Remote Host Certificates ................................................................................................... 210
Figure 121 Certificate Details .............................................................................................................. 210
Figure 122 Example of Static Routing Topology ................................................................................... 213
Figure 123 Advanced > Static Route .................................................................................................... 214
Figure 124 Advanced > Static Route: Edit ............................................................................................ 215