ZyXEL Communications 792H Router User Manual


 
Prestige 792H G.SHDSL Router
List of Figures xix
Figure 11-7 Rule Summary Example............................................................................................................11-6
Figure 12-1 Content Filter: Keyword........................................................................................................... 12-2
Figure 12-2 Content Filter: Schedule........................................................................................................... 12-3
Figure 12-3 Content Filter: Trusted.............................................................................................................. 12-4
Figure 12-4 Content Filter Logs................................................................................................................... 12-5
Figure 13-1 Encryption and Decryption....................................................................................................... 13-2
Figure 13-2 VPN Application ...................................................................................................................... 13-3
Figure 13-3 IPSec Architecture.................................................................................................................... 13-4
Figure 13-4 Transport and Tunnel Mode IPSec Encapsulation.................................................................... 13-5
Figure 14-1 IPSec Summary Fields ............................................................................................................. 14-3
Figure 14-2 VPN Summary ......................................................................................................................... 14-4
Figure 14-3 VPN IKE .................................................................................................................................. 14-8
Figure 14-4 Two Phases to Set Up the IPSec SA....................................................................................... 14-13
Figure 14-5 VPN IKE: Advanced .............................................................................................................. 14-16
Figure 14-6 VPN Manual Key ................................................................................................................... 14-20
Figure 14-7 SA Monitor............................................................................................................................. 14-25
Figure 14-8 Global Setting......................................................................................................................... 14-26
Figure 14-9 VPN Logs............................................................................................................................... 14-27
Figure 14-10 Telecommuters Sharing One VPN Rule Example ................................................................ 14-31
Figure 14-11 Telecommuters Using Unique VPN Rules Example ............................................................ 14-32
Figure 15-1 Telnet Configuration on a TCP/IP Network ............................................................................. 15-2
Figure 15-2 Remote Management................................................................................................................ 15-3
Figure 16-1 Configuring UPnP .................................................................................................................... 16-3
Figure 17-1 System Status ........................................................................................................................... 17-2
Figure 17-2 System Status: Show Statistics ................................................................................................. 17-4
Figure 17-3 DHCP Table.............................................................................................................................. 17-6
Figure 17-4 Diagnostic................................................................................................................................. 17-7