
Prestige 661H/HW Series User’s Guide
25 List of Figures
Figure 39 OTIST in Progress (Prestige) .............................................................................. 100
Figure 40 OTIST in Progress (Client) .................................................................................. 100
Figure 41 No AP with OTIST Found ................................................................................... 101
Figure 42 Start OTIST? ....................................................................................................... 101
Figure 43 Example of Traffic Shaping ................................................................................. 106
Figure 44 WAN Setup (PPPoE) .......................................................................................... 108
Figure 45 Traffic Redirect Example ..................................................................................... 111
Figure 46 Traffic Redirect LAN Setup ................................................................................. 111
Figure 47 WAN Backup ....................................................................................................... 112
Figure 48 How NAT Works .................................................................................................. 116
Figure 49 NAT Application With IP Alias ............................................................................. 116
Figure 50 Multiple Servers Behind NAT Example ............................................................... 119
Figure 51 NAT Mode ........................................................................................................... 120
Figure 52 Edit SUA/NAT Server Set ................................................................................... 121
Figure 53 Address Mapping Rules ...................................................................................... 122
Figure 54 Address Mapping Rule Edit ................................................................................ 123
Figure 55 Dynamic DNS ..................................................................................................... 127
Figure 56 Time and Date ..................................................................................................... 128
Figure 57 Prestige Firewall Application ............................................................................... 132
Figure 58 Three-Way Handshake ....................................................................................... 134
Figure 59 SYN Flood ........................................................................................................... 134
Figure 60 Smurf Attack ....................................................................................................... 135
Figure 61 Stateful Inspection ............................................................................................... 137
Figure 62 Firewall: Default Policy ........................................................................................ 147
Figure 63 Firewall: Rule Summary ..................................................................................... 148
Figure 64 Firewall: Edit Rule ............................................................................................... 151
Figure 65 Firewall: Customized Services ............................................................................ 153
Figure 66 Firewall: Configure Customized Services ........................................................... 154
Figure 67 Firewall Example: Rule Summary ....................................................................... 155
Figure 68 Firewall Example: Edit Rule: Destination Address ............................................. 156
Figure 69 Edit Custom Port Example .................................................................................. 156
Figure 70 Firewall Example: Edit Rule: Select Customized Services ................................. 157
Figure 71 Firewall Example: Rule Summary: My Service .................................................. 158
Figure 72 Firewall: Anti Probing .......................................................................................... 161
Figure 73 Firewall: Threshold .............................................................................................. 163
Figure 74 Content Filter: Keyword ...................................................................................... 166
Figure 75 Content Filter: Schedule ..................................................................................... 167
Figure 76 Content Filter: Trusted ........................................................................................ 168
Figure 77 Encryption and Decryption .................................................................................. 171
Figure 78 IPSec Architecture .............................................................................................. 172
Figure 79 Transport and Tunnel Mode IPSec Encapsulation .............................................. 173
Figure 80 IPSec Summary Fields ....................................................................................... 179
Figure 81 VPN Summary .................................................................................................... 179