Prestige 1600 Universal Access Concentrator
xii List of Figures
Figure 8-3 Menu 12.1 - Edit IP Static Route...............................................................................................................................8-3
Figure 9-1 How NAT Works.......................................................................................................................................................9-2
Figure 9-2 Applying NAT for Internet Access............................................................................................................................9-4
Figure 9-3 Applying NAT to the Remote Node ..........................................................................................................................9-4
Figure 9-4 Menu 15 NAT Setup..................................................................................................................................................9-5
Figure 9-5 Menu 15.1 Address Mapping Sets.............................................................................................................................9-5
Figure 9-6 SUA Address Mapping Rules ...................................................................................................................................9-6
Figure 9-7 First Set in Menu 15.1.1............................................................................................................................................9-7
Figure 9-8 Editing an Individual Rule in a Set............................................................................................................................9-8
Figure 9-9 Multiple Servers Behind NAT...................................................................................................................................9-9
Figure 9-10 Menu 15.2 - NAT Server Setup.............................................................................................................................9-10
Figure 9-11 NAT Example 1.....................................................................................................................................................9-11
Figure 9-12 NAT Example for Internet Access.........................................................................................................................9-11
Figure 9-13 NAT Example 2.....................................................................................................................................................9-11
Figure 9-14 Specifying an Inside Sever....................................................................................................................................9-12
Figure 9-15 NAT - Example 3...................................................................................................................................................9-12
Figure 9-16 Example 3 - Menu 15.1.1.1...................................................................................................................................9-13
Figure 9-17 Example 3 Final Menu 15.1.1 ...............................................................................................................................9-13
Figure 9-18 Example 3 - Menu 15.2.........................................................................................................................................9-14
Figure 9-19 Ethernet SUA ........................................................................................................................................................9-15
Figure 9-20 Applying NAT on the LAN Port ...........................................................................................................................9-15
Figure 10-1 Outgoing Packet Filtering Process ........................................................................................................................10-1
Figure 10-2 Filter Rule Process.................................................................................................................................................10-2
Figure 10-3 Menu 21 - Filter Set Configuration .......................................................................................................................10-3
Figure 10-4 Menu 21.1 - Filter Rules Summary.......................................................................................................................10-4
Figure 10-5 Protocol and Device Filter Sets.............................................................................................................................10-6
Figure 10-6 Menu 21.1.1 - TCP/IP Filter Rule .........................................................................................................................10-7
Figure 10-7 Executing an IP Filter............................................................................................................................................10-9
Figure 10-8 Menu 21.1.2 - Device Filter Rule........................................................................................................................10-10
Figure 10-9 Filtering Ethernet Traffic.....................................................................................................................................10-11
Figure 10-10 Filtering Remote Node traffic............................................................................................................................10-12
Figure 10-11 FTP_WAN Filter Configuration ........................................................................................................................10-13
Figure 10-12 Filter Rule Configuration ..................................................................................................................................10-13
Figure 10-13 Filter Rule Configuration ..................................................................................................................................10-14
Figure 10-14 FTP_WAN Filter Rules Summary.....................................................................................................................10-14
Figure 10-15 Remote Node Profile.........................................................................................................................................10-15
Figure 11-1 SNMP Management Model................................................................................................................................... 11-1
Figure 11-2 Menu 22 - SNMP Configuration ........................................................................................................................... 11-3
Figure 12-1 Menu 23 - System Security ...................................................................................................................................12-1