Vai alla pagina of
Manuali d’uso simili
-
Network Router
NETGEAR DG814
16 pagine 0.54 mb -
Network Router
NETGEAR WGR614 Cable/DSL 54 Mbps Wireless Router WGR614 WGR614
2 pagine 0.91 mb -
Network Router
NETGEAR WNR834M
92 pagine 1.65 mb -
Network Router
NETGEAR WN2000RPTv2
16 pagine 1.64 mb -
Network Router
NETGEAR WNR2000
146 pagine 3.6 mb -
Network Router
NETGEAR WGT624SC
23 pagine 0.28 mb -
Network Router
NETGEAR WNDR3400-100NAS
48 pagine 0.44 mb -
Network Router
NETGEAR DGND4000-100NAS
160 pagine 6.9 mb
Un buon manuale d’uso
Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso NETGEAR FVS338. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica NETGEAR FVS338 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.
Che cosa è il manuale d’uso?
La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso NETGEAR FVS338 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.
Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.
Quindi cosa dovrebbe contenere il manuale perfetto?
Innanzitutto, il manuale d’uso NETGEAR FVS338 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo NETGEAR FVS338
- nome del fabbricante e anno di fabbricazione NETGEAR FVS338
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature NETGEAR FVS338
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti
Perché non leggiamo i manuali d’uso?
Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio NETGEAR FVS338 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti NETGEAR FVS338 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio NETGEAR in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche NETGEAR FVS338, come nel caso della versione cartacea.
Perché leggere il manuale d’uso?
Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo NETGEAR FVS338, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.
Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso NETGEAR FVS338. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.
Sommario del manuale d’uso
-
Pagina 1
March 2008 202-10046-06 v1.0 NETGEAR , Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA FVS338 ProSafe VPN Firewall 50 Reference Manual[...]
-
Pagina 2
ii v1.0, March 2008 © 2007 by NETGEAR, Inc. All rights reserved. T rademarks NETGEAR, the NETGEAR logo a nd ProSafe are trademarks and/or regist ered trademarks of NETGEAR, Inc. Microsoft, W indows, and W indow s NT are registered trademar ks of Microsoft Corporation. Other brand and product names are registered tradem arks or trademarks o f their[...]
-
Pagina 3
v1.0, March 2008 iii Federal Of fice for T elecommuni cations Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for complianc e with the regulations. V olunt ary Control Council for Interfe rence (VCCI) St atement This equipment is in the second category (information equipme[...]
-
Pagina 4
v1.0, March 20 08 iv Open SSL Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitte d provided that the follo wing conditions * are me t: 1. Redistributions of source code must retain the above copyrigh t notice, this list of co nditions and t[...]
-
Pagina 5
v1.0, March 2008 v MD5 Copyright (C) 1990, RSA Data Se curity , Inc. All rights reserved. License to copy and u se this software is granted provided that it is id entified as the "RSA Data Security , Inc. MD5 Message-Digest Algori thm" in all material mentioning or referencing this software or this function. License is also gr anted to ma[...]
-
Pagina 6
v1.0, March 20 08 vi Product and Publication Det ails Model Number: FVS338 Publication Date: March 2008 Product Family: VPN firewall Product Name: ProSafe VPN Firewall 50 Home or Business Prod uc t: Business Language: Engl ish Publication Part Number: 202-10046-06 Publication V ersion Number 1.0[...]
-
Pagina 7
Contents vii v1.0, March 2008 Content s About This Manual Conventions, Formats and Scope ................ ................ ............. ................ ............. ......... xiii How to Use This Manual ........................ ................ ............. ................ ............. ................ xiv How to Print this Manual ...........[...]
-
Pagina 8
viii Contents v1.0, March 2008 Configuring the WAN Mode ... ................ .......... ... ............. ............. ................ ............. ... 2-15 Configuring Dynamic DNS (If N eeded) ..... ................ ................. ............. ................ ...... 2-16 Chapter 3 LAN Configuration Configuring Y our LAN (Local Area Network[...]
-
Pagina 9
Contents ix v1.0, March 2008 Setting Block Sites (C ontent F iltering) ...... ................ ............. ................. ............ .......... 4-22 Enabling Source MAC Filtering .......................... ............. ............. ............. ................ ... 4-24 IP/MAC Binding .. ............ ............. ................. ......[...]
-
Pagina 10
x Contents v1.0, March 2008 Configuring the ProSafe VPN Client for Mode Config ................... ....... ...... ....... ...... 5-30 Certificates ............. ................ ................ ................ ................ ................. ................ .... .. 5-33 T r usted Certificates (CA Certificates) ........ ................ ......[...]
-
Pagina 11
Contents xi v1.0, March 2008 Performing Diagnostics ................ ............. ............. ............. ............. ............ .......... 6-26 Chapter 7 T roubleshooting Basic Functions .................. ............. ................ ............. ............. ................ ............. ........ 7 -1 Power LED Not On .............[...]
-
Pagina 12
xii Contents v1.0, March 2008 Routing Logs ...... ............ ............. ................. ............ ................. ............. ............ ......... B-1 4 LAN to W AN Logs .... ............. ................. ............ ............. ................. ............ ......... B-15 LAN to DMZ Logs ............... ............. ........[...]
-
Pagina 13
xiii v1.0, March 2008 About This Manual The NETGEAR ® ProSafe™ VPN Fir ewall 50 FVS338 Refer ence Manual describes how to install, configure and trou bleshoot the ProSafe VPN Fire wall 50. The information i n this manual is intended for readers with intermedia te computer and Internet skills. Conventions, Format s and Scope The conventions, form[...]
-
Pagina 14
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual xiv About This Manual v1.0, March 2008 • Scope. This manual is written for the VPN fir ewall according to these specifications: For more information about networ k, Internet, firewall, and VPN technologies, see the links to the NETGEAR website in Appendix C, “Related Documents” . How to Use Th[...]
-
Pagina 15
FVS338 ProSafe VPN Firewall 50 Reference Manual About This Manual xv v1.0, March 2008 • Printing from PDF . Y our computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe W eb site at http://www .adobe.c om . – Printing a PDF Chapter . Use the PDF of This Chapt[...]
-
Pagina 16
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual xvi About This Manual v1.0, March 2008[...]
-
Pagina 17
Introduction 1-1 v1.0, March 2008 Chapter 1 Introduction The ProSafe VPN Firewall 50 with 8 port switch c onnects your local area network (LAN) to the Internet through an extern al access device such as a cable modem or DSL modem. The FVS338 is a complete security solution that protects your network from attacks and intrusions. For example, the FVX[...]
-
Pagina 18
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-2 Introduction v1.0, March 2008 • Flash memory for firmware upgrade. Full Routing on Both the Br oadband and Serial W AN Port s Y ou can install, configure, and op erate the FVS338 to take full advantage of a variety of routing options on both the serial and b roadband W A N ports, including: ?[...]
-
Pagina 19
FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-3 v1.0, March 2008 • Port Forwarding with NA T . Although NA T prevents Intern et locations from directly accessing the PCs on the LAN, the firewall allows you to direct incomi ng traffic to specific PCs based on the service port number of the incoming request. Y ou can specify forwar[...]
-
Pagina 20
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-4 Introduction v1.0, March 2008 Easy Inst allation and Management Y ou can install, configure, and operate the ProSafe VPN Firewall 50 within minutes after connecting it to the network. Th e following featur es simplify in stallation and management tasks: • Browser -based management . Browser-ba[...]
-
Pagina 21
FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-5 v1.0, March 2008 • ProSafe VPN Firewall 50. •A C p o w e r a d a p t e r . • Category 5 Ethernet cabl e. • Resour ce CD , including: – Application Notes and ot her helpful information. – ProSafe VPN Client Softwa re – one user license. • W arranty and Support Informati[...]
-
Pagina 22
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-6 Introduction v1.0, March 2008 Router Rear Panel The rear panel of the ProSafe VPN Firewall 50 ( Figure 1-2 ) contains the On/Off switch and AC power connection. T able 1-1. Object Descriptions Object Activity Description Power LED On (Green) Off Power is supplied to the router . Power is not sup[...]
-
Pagina 23
FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-7 v1.0, March 2008 V iewed from left to right, the rear panel contains the following elements: • Modem port – serves as the W AN2 Internet port through the public switched telephone network (PSTN). • Factory Defaults reset button. • Local ports – 8-port RJ-4 5 10/100 Mbps Fast[...]
-
Pagina 24
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-8 Introduction v1.0, March 2008 T o log in to the FVS3 38 once it is connected: 1. Open a W eb browser . 2. Enter http://192.168.1.1 as the URL. 3. Once the login screen displays ( Figure 1-5 ), enter the following: • admin for User Name • password for Password Figure 1-4 Figure 1-5 LAN IP Add[...]
-
Pagina 25
2-1 v1.0, March 2008 Chapter 2 Connecting the FVS338 to the Internet This section provides instructio ns for connecting the VPN firewa ll. Setting up VPN tunnels are covered in Chapter 5, “V irtual Private Networking” : 1. Connect the fir ewall physi cally to your network . Connect the cables, tu rn on your ro uter and wait for the T est LED to[...]
-
Pagina 26
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-2 Connecting the FVS338 to the Intern et v1.0, March 2008 T o log in to the VPN firewall: St e p 1 . Open a Internet Explorer, Netscape® Naviga tor , or Firefox browse r . In the browser window , enter http://192.168.1.1 in the address field. The FVS 338 login screen will display . 2. Enter admin[...]
-
Pagina 27
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-3 v1.0, March 2008 2. Click Auto Detect at the bottom of the screen to automatic ally detect the type of Internet connection provided by your IS P . Auto Detect will probe for different connection methods and suggest one that your ISP will most likely su pp or[...]
-
Pagina 28
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-4 Connecting the FVS338 to the Intern et v1.0, March 2008 3. Click Broadband S t a tus at the to p right of the screen to verify you r Broa dband connection status. Click Conne ct if connection not already present. If Auto Detect does not find a connection, you will be prompted to check the physic[...]
-
Pagina 29
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-5 v1.0, March 2008 St e p 1 . Select Network Configuration from the main menu, W AN Settings from the submenu and click the Dialup ISP Settings tab to display the Dialup settings screen. 2. Enter the following Dialup Account settings: a. Account/User name : En[...]
-
Pagina 30
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-6 Connecting the FVS338 to the Intern et v1.0, March 2008 3. Specify the method to use for your Dial-up Connection S tatus. The VPN firewall can automatically dial to the ISP wh en a connection is needed or can be configured to wait for manual intervention.: a. Check the Connect automatically disc[...]
-
Pagina 31
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-7 v1.0, March 2008 Set up the traffic meter for the Dialup ISP if desired (see “Programming the T raffic Meter (if Desired)” on page 2-12 ). Setting the Router ’ s MAC Address (Advanced Options) Each computer or router on your network has a unique 48-bit[...]
-
Pagina 32
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-8 Connecting the FVS338 to the Intern et v1.0, March 2008 This could occur on some older broadband modems. If you k now that the Ethernet port on your broadband mo dem supports 100Bas eT , select 100BaseT ; oth erwise, select 10BaseT . Use the half-duplex settings if full-duplex modes do not work.[...]
-
Pagina 33
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-9 v1.0, March 2008 . Manually Configuring Y o ur Internet Connection If you know your Broadband ISP connection type, you can bypass the Auto Detect feature and connect your router manually . Ensure that you h ave all of the relevant c onnection information suc[...]
-
Pagina 34
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-10 Connecting the FVS338 to the Intern et v1.0, March 2008 T o manually configure your W AN1 ISP setting s: St e p 1 . Does your Internet connection require a login ? If you need to ente r login information every time you connect to the Internet through your ISP , select Y es. Otherwise, select No[...]
-
Pagina 35
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-11 v1.0, March 2008 – Domain Name : Y our domain name or workgroup name assigned by your ISP , or your ISPs domain name. Y ou may leave this field blank. – Idle Timeout : Check the Keep Connected radio bo x to keep the connection always on. T o logout a[...]
-
Pagina 36
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-12 Connecting the FVS338 to the Intern et v1.0, March 2008 4. If your ISP has not assigned any Domain Name Servers (DNS) addresses, select the Get dynamically from ISP radio box. If your ISP has a ssigned DNS addresses, select the Use these DNS Servers radio box. Ensure that you fill in valid DNS [...]
-
Pagina 37
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-13 v1.0, March 2008 Figure 2-8[...]
-
Pagina 38
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-14 Connecting the FVS338 to the Intern et v1.0, March 2008 T able 2-2. T raffic Meter Settings Parameter Description Enable T raffic Meter Check this if you wish to record the volume of Internet traffic passing through the Router's Broadband or Dial up po rt. Broadband or Dialup can be select[...]
-
Pagina 39
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-15 v1.0, March 2008 Configuring the W AN Mode The WA N M o d e screen allows you to configure how your router uses your external Internet connections; for example, your W AN port or dialup modem co nnections. • NA T . NA T is the technology which allows a[...]
-
Pagina 40
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-16 Connecting the FVS338 to the Intern et v1.0, March 2008 • If you have both ISP lin ks co nnected for Internet connectivity , check the Primary Broadband with Dialup as backup for auto-rollover . 4. The W AN Failure Detection Method must be config ured to notify the router of a link failure if[...]
-
Pagina 41
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-17 v1.0, March 2008 This router firmware includes software that not ifies dynamic DNS servers of changes in the W AN IP address, so that the services running on this network can be acce ssed by others on the Internet. After you have configured y our account[...]
-
Pagina 42
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-18 Connecting the FVS338 to the Intern et v1.0, March 2008 If you have configured Single Po rt, select the tab for a DNS serv ice provider , then fill out the DDNS section for that port. If you have enabled Auto-Rollover , choose a service provider and complete both sections. (Only those options t[...]
-
Pagina 43
LAN Configuration 3-1 v1.0, March 2008 Chapter 3 LAN Configuration This chapter describes how to configure LAN Setu p, LAN Groups and Routin g (Static IP) features of your ProSafe VPN Firewall 50. These features can be found under the Network Configuration menu of the router interface. Configuring Y our LAN (Local Area Network) By default, the fire[...]
-
Pagina 44
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-2 LAN Configuration v1.0, March 2008 T o modify your LAN setup: 1. Select Network Configuration from the main menu and LAN Setup from the submenu. The LAN Setup screen will display . 2. Enter the IP Addr ess of your router (factory default: 192.168 .1.1 ). The IP address provided is the router&apo[...]
-
Pagina 45
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-3 v1.0, March 2008 3. Enter the IP Subnet Mask . The subnet mask specifies the ne twork number portion of an IP address. Y our router will automatically calculate the subnet mask based on the IP address that you assign. Unless you are impl ementing subnetting, use 255.25 5.255.0 as[...]
-
Pagina 46
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-4 LAN Configuration v1.0, March 2008 The feature is particularly useful in Auto Rollover mode. For example, if the DNS se rvers for each connection are different, then a link failure may rend er the DNS servers inaccessible. However , when the DNS proxy is enabled, then clients can make requests t[...]
-
Pagina 47
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-5 v1.0, March 2008 The A vailable Secondary LAN IPs ta ble lists the secondary LAN IP addresses added to the router . • IP Address : The IP address alias added to the LAN port of the router . This is the gateway for computers that need to access the Internet. • Subnet Mask : IP[...]
-
Pagina 48
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-6 LAN Configuration v1.0, March 2008 Managing Group s and Hosts The Known PCs and Devices table on th e Groups and Hosts screen contains a list of all known PCs and network devices, as well as hosts, that ar e assigned dynamic IP addresses by this router . Collectively , these entries make up the [...]
-
Pagina 49
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-7 v1.0, March 2008 • MAC-level Control over PCs. The Network Da tabase uses the MAC address to identify each PC or device. So changing a PC 's IP address does not affect any restrictions on that PC. • Group and Individual Control over PCs – Y ou can assign PCs to Groups [...]
-
Pagina 50
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-8 LAN Configuration v1.0, March 2008 The Network Database is created by: • Using the DHCP Server : The rout er ’ s DHCP server is configured, by default, to respond to DHCP requests from clients on the LAN. Every computer that receives a response from the router will be added to the Network Da[...]
-
Pagina 51
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-9 v1.0, March 2008 • Name : The name of the computer or device. Co mputers that do not support the NetBIOS protocol will be listed as Unknown. In this case , the name can be edit ed manually for easier management. If the computer was assigned an IP address by the DHCP server, the[...]
-
Pagina 52
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-10 LAN Configuration v1.0, March 2008 Setting Up Address Reservation When you specify a reserved IP address for a de vice on the LAN (based on the MAC address of the device), that computer or device will always receive the same IP address each time it accesses the firewall’ s DHCP server . Reser[...]
-
Pagina 53
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-11 v1.0, March 2008 5. Ty p e t h e Destination IP Address or network of the route’ s final destination. 6. Enter the IP Subnet Mask for this destinat ion. If the des tination is a single host, enter 255.255.255.2 55. 7. From the Interface pull-down menu, selection the phys ical [...]
-
Pagina 54
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-12 LAN Configuration v1.0, March 2008 • Y ou have an ISDN firewall on your home network for con necting to the company where you are employed. This firewall’ s address on your LAN is 192.168.1 .100. • Y our com pany’ s network is 13 4.177.0.0. When you first con figured your firewall, t wo[...]
-
Pagina 55
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-13 v1.0, March 2008 T o enable RIP: 1. Select Network Configuration from the main menu and Routing from the submenu. The Routing screen will display . 2. Click the RIP Configuration link. The RIP Configuration screen will display . 3. From the RIP Direction pull-down menu, select t[...]
-
Pagina 56
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-14 LAN Configuration v1.0, March 2008 • None – the router neither broadcasts its rout e table nor does it accept any RIP packets from other routers. This effectively disables RIP . 4. Select the RIP V ersion from the pull-down menu: • RIP-1 – classful routing and does not include subnet in[...]
-
Pagina 57
Firewall Protection and Conten t Filtering 4-1 v1.0, March 2008 Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with W e b content filtering options such as Block Sites and Keyword Blocking. Parents and network administ rators can establish re stricted access policies based on time-of-day , W eb addr ess[...]
-
Pagina 58
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-2 Firewall Protection and Content Filtering v1.0, March 2008 • Outbound : Allow all access from the LAN side to the outside. Services-Based Rules The rules to block traffic are based on the traffic’ s category of service. • Inbound Rules (port forwarding ). Inbound traffic is normally blocke[...]
-
Pagina 59
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 3 v1.0, March 2008 T able 4-1. Outbound Rules Fields Item Description Services Select the desired Service or appli c ati on to be covered by this rule. If the desired service or application does not appear in the list, you must define it using the Services [...]
-
Pagina 60
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-4 Firewall Protection and Content Filtering v1.0, March 2008 Inbound Rules (Port Forwarding) Because the FVS338 uses N etwork Address T ransla tion (NA T), your network presents only one IP address to the Internet and outside users cannot directly address any of your local computers. However , by [...]
-
Pagina 61
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 5 v1.0, March 2008 T able 4-2. Inbound Rules Fields Item Description Services Select the desired Service or appli c ati on to be covered by this rule. If the desired service or application does not appear in the list, you must define it using the Services m[...]
-
Pagina 62
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-6 Firewall Protection and Content Filtering v1.0, March 2008 Remember that allowing inbound services opens holes in your VPN firewall. Only enable those ports that are necessary fo r your network. It is also advisable to turn on the server application security and invoke the user password or privi[...]
-
Pagina 63
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 7 v1.0, March 2008 Setting LAN W AN Rules The Default Outbound Policy is to allow all traf fic from and to the Inte rnet to pass through. Firewall rules can then be applie d to block specific types of traf fic from either go ing out from the LAN to the Inte[...]
-
Pagina 64
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-8 Firewall Protection and Content Filtering v1.0, March 2008 1. In the Action column adjacent to the rule click: • Edit – to make any ch anges to the rule definition of an existing rule. The Outbound Service screen will display containing the data for the selected rule (see Figure 4-3 on page [...]
-
Pagina 65
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 9 v1.0, March 2008 . LAN W AN Inbound Services Rules This Inbound Services Rules tabl e lists all existing rules for in bound traf fic. If you have not defined any rules, no rules will be listed. By default, all inbound traffic is blocked. W AN Users : Whet[...]
-
Pagina 66
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-10 Firewall Protection and Content Filtering v1.0, March 2008 Att ack Checks This screen allows you to specify whether or no t the router should be protected against common attacks in the LAN and W AN networks. The vari ous types of attack checks are listed on the Attack Checks screen and defined [...]
-
Pagina 67
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -11 v1.0, March 2008 • LAN Security Ch ecks. A UDP flood is a form of denial of service attack that can be initiated when one machine sends a large nu mber of UDP packets to random ports on a remote host. As a result, the distant host will (1) check for th[...]
-
Pagina 68
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-12 Firewall Protection and Content Filtering v1.0, March 2008 . Session Limit Session Limit allows you to spec ify the total number of sessions per user over an IP (Internet Protocol) connection allowed across the router . This feature can be enable d on the Session Limit screen and is shown below[...]
-
Pagina 69
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -13 v1.0, March 2008 T o enable Session Limit : 1. Click the Y es radio button under Do you want to enable Session Limit ? 2. From the User Limit Paramete r drop-down list, define the maximum number of sessions per IP either as a perc entage of maximu m sess[...]
-
Pagina 70
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-14 Firewall Protection and Content Filtering v1.0, March 2008 Allowing Vi deoconference from Restricted Addresses If you want to allow incoming vi deoconferencing to be initiated from a restricted range of outside IP addresses, such as from a branch office, you can create an inbound rule. In the e[...]
-
Pagina 71
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -15 v1.0, March 2008 Setting Up One-to-One NA T Mapping In this example, we will configure multi-NA T to support multiple public IP addresses on one W AN interface. By creating an inbound rule, we will configure the firewa ll to host an additional public IP [...]
-
Pagina 72
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-16 Firewall Protection and Content Filtering v1.0, March 2008 6. From the Public Destination IP Address pull down menu, choose Other Public IP Address. 7. Enter one of your public Internet addresses that will be used by c lients on the Internet to reach your W eb server . 8. Click Apply . The rule[...]
-
Pagina 73
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -17 v1.0, March 2008 T o test the connection from a PC on the Internet, type http:// <IP_address> , where <IP_address> is the public IP address you have mapped to your W eb server . Y ou should see the home page of your W eb server . Spec ifying [...]
-
Pagina 74
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-18 Firewall Protection and Content Filtering v1.0, March 2008 Outbound Rules Example – Bl ocking Inst ant Messenger Outbound rules let you prev ent users from using applications such as AOL Instant Messenger , Real Audio or othe r non-essential sites. If you want to block AOL Instant Messenger u[...]
-
Pagina 75
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -19 v1.0, March 2008 Although the FVS338 already holds a list of many service port numbers, you are not limited to these choices. Use the Services menu to add additional services and applications to the list for use in defining firewall rules. The Services m[...]
-
Pagina 76
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-20 Firewall Protection and Content Filtering v1.0, March 2008 T o add a service: 1. Select Security from the main menu and Services from the submenu. The Services screen will display . 2. In the Add Custom Service table, enter a descriptive name for the service (this is for your convenience). 3. S[...]
-
Pagina 77
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -21 v1.0, March 2008 • Normal-Service: No special priority given to the traf fi c. The IP packets for servic es with this priority are marked with a T oS value of 0. • Minimize-Cost: Used when data has to be trans ferred over a link that has a lower “c[...]
-
Pagina 78
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-22 Firewall Protection and Content Filtering v1.0, March 2008 Repeat these 5 steps to set to a schedule for Schedule 2 and Schedule 3 . Setting Block Sites (Content Filtering) If you want restrict internal LAN users from access to certain sites on the Internet, you can use the VPN firewall’ s Co[...]
-
Pagina 79
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -23 v1.0, March 2008 Y ou can bypass Keywor d blo cking for truste d domains by add i ng the exact m atching domain to the list of T rusted Domains. Access to the domains or keywor ds on this list by PCs, even those in the groups for which keyword blocking h[...]
-
Pagina 80
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-24 Firewall Protection and Content Filtering v1.0, March 2008 Enabling Source MAC Filtering Source MAC Filter allows you to filter out tr af fic coming from certain known machines or devices. • By default, the source MAC address filter is disabled. All the traf fic received from PCs with any MAC[...]
-
Pagina 81
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -25 v1.0, March 2008 • When enabled, traffic will be dropped coming from any comp uters or devices whose MAC addresses are listed in A v ailable MAC Addresses to be Blocke d table. T o enable MAC filtering and add MAC addresses to be blocked: 1. Select Sec[...]
-
Pagina 82
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-26 Firewall Protection and Content Filtering v1.0, March 2008 6. When you have completed ad ding MAC addresses, click Apply to save your settings. IP/MAC Binding IP/MAC Bindi ng allows you to bind an IP to a MAC address and vice-versa. Some machines are configured with static addresses. T o preven[...]
-
Pagina 83
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -27 v1.0, March 2008 The IP/MAC Binding T able lists the cu rrently defined IP/MAC Bind rules: • Name : Displays the user-defi ned name for this rule. • MAC Addresses : Displays the MAC Addresses for this rule. • IP Addresses : Displays the IP Addresse[...]
-
Pagina 84
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-28 Firewall Protection and Content Filtering v1.0, March 2008 4. T o remove an entry from the table, sel ect the IP/MAC Bind entry and click Delete . 5. Click Apply to save your settings. Setting Up Port T riggering Port triggering allows some applications running on a LAN networ k to be available[...]
-
Pagina 85
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -29 v1.0, March 2008 2. From the Enable pull-down menu, indicate if th e rule is enabled or disabled. 3. From the Protocol pull-down menu, select either TCP or UDP protocol. 4. In the Outgoing (T rigger) Port Range fields; a. Enter the St a r t P o r t range[...]
-
Pagina 86
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-30 Firewall Protection and Content Filtering v1.0, March 2008 b. Enter the End Port range (1 - 65534). 6. Click Add. The Port T riggering Rule will be added to the Port T riggering Rules table. T o edit or modify a rule: 1. Click Ed it in the Action column opposite th e rule you wish to edit. The [...]
-
Pagina 87
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -31 v1.0, March 2008 • Bandwidth limiting for outbound traf fic is done on the available W AN interface in both the single port and Auto Rollover modes. Bandwidth limiting is ha ndl ed on the user-specified interface in Load Balancing mode. • Bandwidth l[...]
-
Pagina 88
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-32 Firewall Protection and Content Filtering v1.0, March 2008 • WA N : Displays the W AN interface fo r the Load Balancing mode. 2. Click Add to add a new Band width Profile. When the Add New Bandwidth Profile screen displays, enter the following: a. Name : Specify an easily identifiable name fo[...]
-
Pagina 89
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -33 v1.0, March 2008 other general information based on the settings you input on the Firewall Logs & E-mail screen. In addition, if you have set up Cont ent Filtering on the Block Sites screen (see “Setting Block Sites (Content Filtering)” on page 4[...]
-
Pagina 90
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-34 Firewall Protection and Content Filtering v1.0, March 2008 T o set up Firewall Logs and E-mail alerts: 1. Select Monitoring from the main me nu and then Fir ewall Logs & E-mail from the submenu. The Fir ewall Logs & E-mail screen will display . 2. Enter the name of the log in the Log Id[...]
-
Pagina 91
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -35 v1.0, March 2008 • LOG_W ARNING (W arning conditions) • LOG_NOTICE (Normal but significant conditions) • LOG_INFO (Informational messages) • LOG_DEBUG (Debug level messages) 10. Click Reset to cancel your changes and re turn to the previous setti[...]
-
Pagina 92
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-36 Firewall Protection and Content Filtering v1.0, March 2008 Administrator Information Consider the following operational items: 1. As an option, you can en able remote manageme nt if you have to manage distant sites from a central location (see “Enabling Remote Management Access” on page 6-9[...]
-
Pagina 93
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -37 v1.0, March 2008[...]
-
Pagina 94
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-38 Firewall Protection and Content Filtering v1.0, March 2008[...]
-
Pagina 95
Virtual Private Networking 5-1 v1.0, March 2008 Chapter 5 V irtual Private Networking This chapter describes how to u se the V irtua l Private Networking (VPN) features of the VPN firewall. VPN tunnels provide secure, encrypted communications between your local network an d a remote network or computer . Dual W AN Port Systems The dual W AN ports i[...]
-
Pagina 96
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-2 Virtual Private Networking v1.0, March 2008 Setting up a VPN Connect ion using the VPN Wizard Setting up a VPN tunnel connection requires that al l settings and parameters on both sides of the VPN tunnel match or mirror each other pre cisely , whic h can be a daunting tas k. The VPN W izard can [...]
-
Pagina 97
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-3 v1.0, March 2008 The Local W AN IP address is the address used in the IKE negotiation phase. Automatically , the W AN IP address assigned by your ISP may display . Y ou can modify the address to use your FQDN; required if the W AN Mode you selected is auto-rollover . 7. [...]
-
Pagina 98
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-4 Virtual Private Networking v1.0, March 2008 IKE Policies The IKE (Internet Key Exchange) protocol performs negotiations between the two VPN Gateways, and provides automatic ma nagement of the Keys used in IPSec. It is important to remember that: • “Auto” generated VPN policies must use the[...]
-
Pagina 99
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-5 v1.0, March 2008 • Name . Uniquely identifies each IKE policy . The name is chosen by you and used for the purpose of managing your policies; it is not su pplied to the remote VPN Server . If the Policy is a Client Policy , it will be prepended by an “*”. • Mode [...]
-
Pagina 100
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-6 Virtual Private Networking v1.0, March 2008 In addition, a CA (Certificate Authority) can also be used to perform authentication (see “Certificates” on page 5- 33 ). T o use a CA, each VPN Gatewa y must have a Certificate from the CA. For each Certificate, there is both a “Public Key” an[...]
-
Pagina 101
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-7 v1.0, March 2008 – Reconnect after failur e count : Fresh negotiation starts wh en no acknowledgement is received for the specified number of consecutive packets. • Local . IP address (either a single address, range of address or subnet ad dre ss) on your local LAN. [...]
-
Pagina 102
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-8 Virtual Private Networking v1.0, March 2008 Creating a VPN Gateway Conn ection: Between FVS338 and FVX538 This section describes how to configure a VP N connection between a NETGEAR FVS338 VPN Firewall and a NETGEAR FVX538 VPN Firewall. Using each firewall's VPN W izard, we will create a se[...]
-
Pagina 103
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-9 v1.0, March 2008 The IKE Policies screen will display showin g the new “to_fvx” policy . Y ou can view the IKE para meters by clicking Edit in the Action column adjacent to the “to- fvs” policy . It should not be necessary to make any changes. Figure 5-1 Figure 5[...]
-
Pagina 104
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-10 Virtual Private Ne tworking v1.0, March 2008 Click the IKE Policies tab to view the corresp onding IKE Policy . The IKE Policies screen will display . Y ou can view the VPN parameters by clicking Edit in the Actions column adjacent to “to_fvx”. It should no t be n ecessary to make any chang[...]
-
Pagina 105
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-11 v1.0, March 2008 Configuring the FVX538 T o configure the FVX538 using the VPN W izard: 1. Select VPN from the main menu. The Policies screen will display . Click the VPN Wizard link. The VPN Wizard screen will display . 2. Check the Gateway radio box to establish a re[...]
-
Pagina 106
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-12 Virtual Private Ne tworking v1.0, March 2008 6. Enter the remote LAN IP address and subnet mask. 7. Click Apply to create the “to_fvs” IKE and VPN policies. T e sting the Connectio n 1. From a PC on either firewa ll’ s LAN, try to ping a PC on the other firewall’ s LAN. Establishing the[...]
-
Pagina 107
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-13 v1.0, March 2008 Using the FVS338 VPN W izard, we will create a si ngle set of policies (IKE and VPN) that will allow up to 50 remote PCs to connect from locatio ns in which their IP addresses are un known in advance. The PCs may be directly connected to the Internet o[...]
-
Pagina 108
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-14 Virtual Private Ne tworking v1.0, March 2008 Configuring the VPN Client On a remote PC that has a NETGEAR ProSafe VPN C lient installed, configure the client using the FVS338 VPN Client default parameters (display ed in both the IKE Policy table and the VPN Policy table of the FVS338 under the [...]
-
Pagina 109
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-15 v1.0, March 2008 T o configure the VPN Client: 1. Right-click on the VPN client icon in your W indows toolbar and select the Security Pol icy Editor . The Security Policy Editor screen will display . 2. In the upper left of the Polic y Editor window , click the New Doc[...]
-
Pagina 110
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-16 Virtual Private Ne tworking v1.0, March 2008 8. In the left frame, click on My Identity (shown in Figure 5-1 0 ). 9. From the Select Certificate pull-down menu, select None . 10. From the ID T ype pull-down menu, select Domain Name and enter fvs_remote.com in the field provided. 11 . Leave V ir[...]
-
Pagina 111
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-17 v1.0, March 2008 12. Before leaving the My Identity menu, click Pr e-Shared Key . 13. Click Enter Key , and type your preshared key . Click OK . This key will be shared by all users of the FVS338 policy “home”. Figure 5-10 Figure 5-1 1 10.0.0.12 fvs_remote.com 10.0[...]
-
Pagina 112
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-18 Virtual Private Ne tworking v1.0, March 2008 14. In the left frame, click Security Policy (shown in Figure 5-12 ). 15. Select Phase 1 Negotiation Mo de by checking the Aggressive Mode radio box. 16. PFS Key Group should be disabled, and Enable Replay Detection should be enabled. 17. In the left[...]
-
Pagina 113
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-19 v1.0, March 2008 18. In the left frame, expand Key Exchange (Phase 2) and select Proposal 1 . Compare with the figure below . No changes should be neces sary . 19. In the upper left of the window , click the disk icon to save t he policy . T e sting the Connectio n T o[...]
-
Pagina 114
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-20 Virtual Private Ne tworking v1.0, March 2008 Extended Authentication (XAUTH) Configuration When connecting many VPN clients to a VPN gateway router , an administrator may want a unique user authentication method beyond relying on a single common preshared key for all clien ts. Although the admi[...]
-
Pagina 115
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-21 v1.0, March 2008 . Configuring XAUTH for VPN Client s Once the XAUTH has been enabled, you must establish user ac count s on the Local Database to be authenticated against XAUTH, or you must en able a RADIUS-CHAP or RADIUS-P AP server . T o enable and configure XAUTH: [...]
-
Pagina 116
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-22 Virtual Private Ne tworking v1.0, March 2008 • IPSec Host if you want to be authenticated by the remote gateway . In the adjacent Username and Password fields, type in the information user name and password associated with the IKE policy for authenticating this gateway (by the remote gateway)[...]
-
Pagina 117
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-23 v1.0, March 2008 3. Enter a Password for the user , and reenter the password in the Confirm Password field. 4. Click Add. The User Name will be added to the Configured Hosts table. T o edit the user name or password: 1. Click Edit opposite the user ’ s name. The Edit[...]
-
Pagina 118
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-24 Virtual Private Ne tworking v1.0, March 2008 information such as a username/password or some encrypted response using his username/ password information. The gateway will try and verify this information first against a local User Database (if RADIUS-P AP is enabled) and then by relaying the inf[...]
-
Pagina 119
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-25 v1.0, March 2008 Manually Assigning IP Addresses to Remote Users (ModeConfig) T o simply the process of connecting remote VPN clients to the FVS338, the ModeConfig module can be used to assign IP addresses to remote u sers, including a netw ork acce ss IP address, subn[...]
-
Pagina 120
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-26 Virtual Private Ne tworking v1.0, March 2008 ModeConfig Operation After IKE Phase 1 is complete, the VPN connectio n initiator (remote user/client) asks for IP configuration parameters such as IP address, subnet mask and name server addresses. The ModeConfig module will allocat e an IP addres s[...]
-
Pagina 121
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-27 v1.0, March 2008 9. Specify the VPN policy settings . These settings must match the configuration of the remote VPN client. Recommended settings are: • SA Lifetime: 3600 sec onds • Authentication Algorithm: SHA-1 • Encryption Algori thm: 3DES 10. Click Apply . Th[...]
-
Pagina 122
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-28 Virtual Private Ne tworking v1.0, March 2008 2. Click Add to configure a new IKE Policy . The Add IKE Policy screen will display . 3. Enable Mode Config by checking the Ye s radio box and selecting the Mode Config record you just created from the pull-down menu. (Y ou ca n view the parameters o[...]
-
Pagina 123
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-29 v1.0, March 2008 9. If Edge Device was enabled, select the Authentication T ype from the pull down menu which will be used to verify accoun t information: User Database, RADIUS-CHAP or RADIUS-P AP . Users must be added thorough the User Database screen (see “User Dat[...]
-
Pagina 124
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-30 Virtual Private Ne tworking v1.0, March 2008 Configuring the ProSafe VP N Client for ModeConfig From a client PC running NETGEAR ProSafe VP N Client software, configure the remote VPN client connection. T o configure the client PC: 1. Right-click the VPN client icon in the W indows toolbar . In[...]
-
Pagina 125
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-31 v1.0, March 2008 b. From the Select Certificate pull-down menu, select None. c. From the ID T ype pull-down menu, select Doma in Name and create an identifier based on the name of the IKE pol icy you cr eated; for example “remote_id.com”. d. Under V irtual Adapter [...]
-
Pagina 126
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-32 Virtual Private Ne tworking v1.0, March 2008 5. Click on Key Exchange (Phase 2) on the left-sid e of the menu and select Proposal 1. Enter the values to match your configuration of the VPN firewall ModeConfig Record menu. (The SA Lifetime can be longer , such as 8 hours (28800 seconds)). 6. Cli[...]
-
Pagina 127
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-33 v1.0, March 2008 T o test the connection: 1. Right-click on the VPN client icon in th e W indows toolbar and select Connect. The connection policy you configured will appear; in this case “M y Connectionsm odecfg_test”. 2. Click on the connection. W ithin 30 secon[...]
-
Pagina 128
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-34 Virtual Private Ne tworking v1.0, March 2008 2. Click Br owse to locate the trusted certificate on your computer and then click Upload . The certificate will be stored on the router and will display in the T rusted Certificates tabl e. Self Certificates Active Self certificates are certificates[...]
-
Pagina 129
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-35 v1.0, March 2008 • Name – Enter a name that will identify this Certificate. • Subject – This is the name which other organizatio ns will see as the Hol der (owner) of the Certificate. Since this name will be seen by other organizations, you should use your regi[...]
-
Pagina 130
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-36 Virtual Private Ne tworking v1.0, March 2008 . T o submit your Self Certificate request to a CA: 1. Connect to the web site of the CA. 2. Start the Self Certificate request procedure. 3. When prompted for the requested data, copy the data from your saved data file (including “--- -BEGIN CER T[...]
-
Pagina 131
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-37 v1.0, March 2008 When you obtain th e certificate from the CA, you can then upload it to your computer . Click Browse to locate the Certificate file and then click Upload. The certificate will display in the Active Self Certificates table (see Figure 5 -25 ). Certifica[...]
-
Pagina 132
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-38 Virtual Private Ne tworking v1.0, March 2008[...]
-
Pagina 133
Router and Network Ma nagement 6-1 v1.0, March 2008 Chapter 6 Router and Network Management This chapter describes how to use the network manag eme nt features of your ProSa fe VPN Firewall 50. These features can be found by cli cking on the appropriate heading in the Main Menu of the browser interface. The ProSafe VPN Firewall 50 offers many tools[...]
-
Pagina 134
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-2 Router and Network Man a ge m en t v1.0, March 2008 Service Blocking Y ou can control specific outbound traffic (for example., from LAN to W AN). Outbound Services lists all existing rules for outbound traffic. If you have not defined any rules, only the default rule will be listed. The default [...]
-
Pagina 135
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-3 v1.0, March 2008 See “Using Rules to Block or Allo w Specific Kinds of Traf fic ” on page 4-1 for the procedure on how to use this feature. Services. The Rules menu contains a list of predefined Services for creating firewall rules. If a service does not appear i[...]
-
Pagina 136
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-4 Router and Network Man a ge m en t v1.0, March 2008 Y ou can bypass keyword blocking fo r trusted domains by adding th e exact matching domain to the list of T rusted Domains. Access to the doma ins on this list by PCs even in the groups for which keyword blocking has been enabled w ill still be[...]
-
Pagina 137
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-5 v1.0, March 2008 Y ou can control specific inbound traffic (i .e., from W AN to LAN and from W AN to DMZ). Inbound Services lists all existing rules for inbound traf fic. If you have not defined any rules, only the default rule will be listed. The defa ult rule block[...]
-
Pagina 138
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-6 Router and Network Man a ge m en t v1.0, March 2008 • Services – Y ou can specify the desired Services or applications to be covered by this rule. If the desired service or application does not app ear in the list, you must define it using the Services menu (see “Adding Cus tomized Service[...]
-
Pagina 139
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-7 v1.0, March 2008 Using QoS to Shif t the T raffic Mix The QoS priority settings determine the priority and, in turn, the quality of service for t he traffic passing through the firewall. The QoS is set individually for each service. • Y ou can accept the default pr[...]
-
Pagina 140
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-8 Router and Network Man a ge m en t v1.0, March 2008 T o modify User or Admin settings: 1. Select Administration from the main menu and Set Password from the submenu. The Set Password screen will display . 2. Select the Settings you wish to edit by checking either the Edit Admin Settings or Edit [...]
-
Pagina 141
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-9 v1.0, March 2008 Enabling Remote Management Access Using the Remote Manage ment page, you can allo w an administrator on the In ternet to configure, upgrade, and check the statu s of your VPN firewa ll. Y o u must be logged in locally to enable remote management (see[...]
-
Pagina 142
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-10 Router and Networ k Management v1.0, March 2008 T o configure your firewall for Remote Management: 1. Select the T urn Remote Management On check box. a. Specify what external addresses will be a llowed to access the firewall’ s remote management. b. T o allow access from any IP address on th[...]
-
Pagina 143
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-11 v1.0, March 2008 2. Specify the Port Number that will be used for accessing the ma nagement interface. W eb browser access normally uses the standard HTTP service port 80. For greater security , you can change the remote manag eme nt W eb in terface to a custom por[...]
-
Pagina 144
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-12 Router and Networ k Management v1.0, March 2008 3. Specify what external addresses will be allowed to access the firewall’ s remote management. a. T o allow access from any IP addr e ss on the Interne t, select Everyone . b. T o allow access from a range of IP addresses on the Internet, selec[...]
-
Pagina 145
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-13 v1.0, March 2008 • If you want to make the VPN firewall globa lly accessible using the community string, but still receive traps on the host, enter 0.0.0.0 as the Subnet Mask and an IP Address for where the traps will be received. 3. Enter the trap port number of[...]
-
Pagina 146
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-14 Router and Networ k Management v1.0, March 2008 Settings Backup and Firmware Upgrade Once you have installed the VPN firewall and have it working p roperly , you should back up a co py of your setting so that it is if something goes wrong. When you backup the settings, they are saved as a file [...]
-
Pagina 147
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-15 v1.0, March 2008 Y ou must manually restart the VPN firewall in orde r for the default settings to take effect. After rebooting, the router's password will be password and the LAN IP address will be 192. 168.1.1. The VPN firewall will act as a DHCP server on t[...]
-
Pagina 148
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-16 Router and Networ k Management v1.0, March 2008 T o upgrade router software: 1. Select Administration from the main menu and Settings Backup & Upgrade from the submenu. The Settings Backup and Firmware Upgrad e screen will display . 2. Click Br owse in the Router Upgrade section. 3. Locate [...]
-
Pagina 149
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-17 v1.0, March 2008 3. If supported in your region, check the Automatically Adjust for Daylight Savings Time radio box. 4. Select a NTP Server option by check ing one of the following radio boxes: • Use Default NTP Servers : If this is enabled, then the R T C (Real-[...]
-
Pagina 150
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-18 Router and Networ k Management v1.0, March 2008 Enabling the T raffic Meter T o monitor traffic limits on eac h of the W AN ports, select Administration from the main menu and T raffic Meter from the submenu. The Broadband T raffic Meter screen will display . (The Broadband and D ialup ports ar[...]
-
Pagina 151
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-19 v1.0, March 2008 Setting Login Failures and Att acks Notification Figure 6-8 shows the Firewall Logs & E-mail screen that is invoked by selecting Monitorin g from the main menu and selecting Firewall Logs & E-mail from the submenu. Y ou can send a System lo[...]
-
Pagina 152
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-20 Router and Networ k Management v1.0, March 2008 Figure 6-8 Select the types of Enable email alerts. events to email. View System Logs Select the segments to track for System Log events. Syslog Server enabled[...]
-
Pagina 153
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-21 v1.0, March 2008 V iewing Port T riggering St atus Y ou can view the status of Port Triggering by selecting Security from the main menu and Port T riggering from the submenu. When the Port T riggering screen display , click the St a t u s link. Figure 6-9 T able 6-[...]
-
Pagina 154
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-22 Router and Networ k Management v1.0, March 2008 V iewing Router Configuration and System S tat us The Router S tatus menu provides status and us age information. From the main menu of the browser interface, click on Ma nagement , then select Router S tatus , The Router S tatus scree n will disp[...]
-
Pagina 155
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-23 v1.0, March 2008 Monitoring W AN Port s St atus Y ou can monitor the status of both of th e W AN connections, the Dynamic DNS Server connections, and the DHCP Se rver connections. Select Network Configuration from the main menu and W A N Se ttings from the submenu.[...]
-
Pagina 156
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-24 Router and Networ k Management v1.0, March 2008 . Monitoring VPN T unnel Connection St atus Y ou can view the status of the VPN tunnels by selecting VPN from the main menu and Connection S tatus from the submenu. The IPSec Connection S tatus screen will display . Figure 6-1 1 Figure 6-12 T able[...]
-
Pagina 157
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-25 v1.0, March 2008 VPN Logs The VPN Logs screen gives log details for recent VPN activity . Select Monitoring from the main menu and VPN Logs from the submenu to view the VPN Logs . Y ou can refresh the log display to view the most recent entries, or clear th e log d[...]
-
Pagina 158
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-26 Router and Networ k Management v1.0, March 2008 Performing Diagnostics Y ou can perform diagnostics such as pinging an IP address, performing a DNS lookup, displaying the routing table, rebooti ng the firewall, and capturing packets. Select Monitoring from the ma in menu and Diagnostics from th[...]
-
Pagina 159
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-27 v1.0, March 2008 Figure 6-15 T able 6-4. Diagnostics Fields Item Description Ping or T race an IP address Ping – Used to send a ping packet requ es t to a specified IP address—most often, to test a connection. If the request times ou t (no reply is received), i[...]
-
Pagina 160
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-28 Router and Networ k Management v1.0, March 2008 Reboot the Router Used to perform a remote reboot (restart). Y ou can use this if th e Router seems to have become unstable or is not operating normally . Note : Rebooting will break any e xisting connec tions either to the Router (such as this on[...]
-
Pagina 161
Troubleshooting 7-1 v1.0, March 2008 Chapter 7 T roubleshooting This chapter provides troubleshooting tips and information for your Pr oSafe VPN Firewall 50. After each problem description, instructions ar e provided to help yo u diagnose and solve the problem. Basic Functions After you turn on power to th e firewall, the following seque nce of eve[...]
-
Pagina 162
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-2 Troubleshooting v1.0, March 2008 LEDs Never T urn Off When the firewall is turned on, the LEDs turns on for about 10 sec onds and then turn off. If all the LEDs stay on, there is a fault within the firewall. If all LEDs are still on one minute after power up: • Cycle the power to see if the fi[...]
-
Pagina 163
FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-3 v1.0, March 2008 • Make sure your PC’ s IP address is on the sam e subnet as the firewall. If you are using the recommended addressing sch eme, yo ur PC’ s address should be in the range of 192.168.0 .2 to 192.168.0. 254. • If your firewall’ s IP address ha s been changed[...]
-
Pagina 164
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-4 Troubleshooting v1.0, March 2008 T roubleshooting the ISP Connection If your firewall is unable to a ccess the Internet, you should first determine whether the firewall is able to obtain a W AN IP address from the ISP . Un less you have been assigned a static IP address, your firewall must reque[...]
-
Pagina 165
FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-5 v1.0, March 2008 – Configu re y our firewall to spoof your PC’ s MAC ad dress. This can be do ne in the Basic Settings menu. Refer to “Configuring your Internet Connection ” on page 2-2 . If your firewall can obtain an IP addre ss, but your PC is unable to load an y W eb pa[...]
-
Pagina 166
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-6 Troubleshooting v1.0, March 2008 If the path is not functioning correctly , you could h ave one of the following problems: • W rong ph ysical connections – Make sure the LAN port LED is on. If the LED is off, follow the instruct ions in “LAN or Internet Port LEDs Not On ” on page 7-2 . ?[...]
-
Pagina 167
FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-7 v1.0, March 2008 Restoring the Default Co nfiguration and Password This section explains how to restore the fact ory default configuratio n settings, changing the firewall’ s administration password to password and the IP address to 192.168.1.1. Y ou can erase the current configu[...]
-
Pagina 168
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-8 Troubleshooting v1.0, March 2008[...]
-
Pagina 169
Default Settings and Technical Specifications A-1 v1.0, March 2008 Appendix A Default Settings and T echnical S pecifications Y ou can use the reset button located on the front of your device to reset all settings to their factory defaults. This is called a hard reset. • T o perform a hard reset, push and hold the reset button for approximately 5[...]
-
Pagina 170
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual A-2 Default Settings and Technical Specifications v1.0, March 2008 T echnical Specifications for the ProSafe VPN Firewall 50 are listed in the following table. T ime Zone GMT T ime Zone Adj usted for Daylight Saving Ti m e Disabl ed SNMP Disabled Remote Manageme nt Disabled Firewall Inbound (communi[...]
-
Pagina 171
FVS338 ProSafe VPN Firewall 50 Reference Manual Default Settings and Technical Specifications A-3 v1.0, March 2008 Environmental S pecifications Operating temperature: 0 ° to 40 ° C (32º to 104º F) Operating humidity: 90% maximum relative humidity , noncondensi ng Electromagnetic Emissions Meets requirements of: FCC Part 15 Class B VCCI Class B[...]
-
Pagina 172
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual A-4 Default Settings and Technical Specifications v1.0, March 2008[...]
-
Pagina 173
System Logs and Error Messa ge s B-1 v1.0, March 2008 Appendix B System Logs and Error Messages This appendix uses the fo llowing log parameter terms. System Log Messages This section describes log messages that be long to one of the following categories: • Logs generated by traffic that is meant for the device. • Logs generated by traf fic tha[...]
-
Pagina 174
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-2 System Logs and Erro r Messages v1.0, March 2008 Reboot This section describes log messages generated during system reboot. NTP This section describes log messages generated by the NTP daemon during synchronization with the NTP server . • The fixed time and date before NTP sy nchronizes with a[...]
-
Pagina 175
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-3 v1.0, March 2008 Login/Logout This section describes logs ge nerated by the administrativ e interfaces of the device. Firewall Rest art This logging is always done. T able B-4. System Logs: NTP Message Nov 28 12:31:13 [FVS338] [nt pdate] Looking Up time-f.netgear.co[...]
-
Pagina 176
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-4 System Logs and Erro r Messages v1.0, March 2008 IPSec Rest art This logging is always done. W AN S t atus This section describes the logs generated by th e W AN component. If there are two ISP links for Internet connectivity , the router can be confi gured either in Auto Rollover Mode or Load B[...]
-
Pagina 177
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-5 v1.0, March 2008 Auto Rollover When W AN mode is configured to Auto Rollover , primary link is active and secondary acts as a backup. When primary link goes down, secondary becomes active until primary comes up. The device monitors the status of the prim ary link by[...]
-
Pagina 178
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-6 System Logs and Erro r Messages v1.0, March 2008 PPP Logs This section describes the W AN PPP connection logs. The PPP type can be configured from the web management. System Logs: W AN Stat us, Auto Rollover Message Nov 17 09:59:09 [FVS338] [wan d] [L BFO] W AN1 T est Failed 1 of 3 times_ Nov 17[...]
-
Pagina 179
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-7 v1.0, March 2008 PPPoE Idle-Timeout Logs. T able B-9. System Logs: W A N St atus, PPE, PPPoE Idle-Timeout Message Nov 29 13:12:46 [FVS33 8 ] [pppd] S tarting connection Nov 29 13:12:49 [FVS338] [ppp d] Remote messa ge: Success Nov 29 13:12:49 [FVS338] [ppp d] P AP a[...]
-
Pagina 180
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-8 System Logs and Erro r Messages v1.0, March 2008 PPTP Idle-T imeout Logs. PPP Authentication Logs. We b Filtering and Content Filtering Logs T o enable web keyword filtering logs, set value of keywordLog to 1 from CLI. Command to set this value fro m CLI: monitor/firewallLogs/logger/ loggerConfi[...]
-
Pagina 181
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-9 v1.0, March 2008 T able B-12. System Logs: W eb Filtering and Content Filtering Message Jan 23 16:36:35 [FVS338] [ker nel] [KEYWORD_BL OCKED] [URL]==>[ www .redhat.com/ ] IN=SELF OUT=SELF SRC=19 2.168.10.210 DST=209.132.177.50 PROTO=TCP SPT=4282 DPT=80 Explanatio[...]
-
Pagina 182
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-10 System Logs and Error Messages v1.0, March 2008 T raffic Metering Logs Unicast Logs ICMP Redirect Logs T able B-13. System Logs : T raffic Metering Message Jan 23 19:03:44 [TRAFFIC_METER] TRAFFIC_METER: Monthly Limit o f 10 MB has reached for W AN1._ Explanation T raffic limit to W AN1 t hat wa[...]
-
Pagina 183
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-11 v1.0, March 2008 Multicast/Broadcas t Logs FTP Logging Invalid Packet Logging T able B-16. System Logs : Mult icast/Broadcast Message Jan 1 07:24:13 [FVS338] [kernel] MCAST -BCAST IN=W AN OUT=SELF SRC=192.168.1.73 DST= 19 2.168.1.255 PROTO=UDP SPT=138 DPT=138 Expla[...]
-
Pagina 184
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-12 System Logs and Error Messages v1.0, March 2008 Recommended Action 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 T o allow invalid packet and disable logging: fw/rules/attackChecks/configu[...]
-
Pagina 185
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-13 v1.0, March 2008 Recommended Action 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 T o allow invalid packet and disable logging: fw/rules/attackChecks/configur[...]
-
Pagina 186
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-14 System Logs and Error Messages v1.0, March 2008 Routing Logs This section is used to configure the logging options for each network segment lik e LAN-W AN for debugging purposes. This may generate a significant volume of log messages. Message 2007 Oct 1 00:44:17 [FVX538] [kernel] [INV ALID][REO[...]
-
Pagina 187
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-15 v1.0, March 2008 LAN to W AN Logs LAN to DMZ Logs DMZ to W AN Logs W AN to LAN Logs T able B-19. Routing Logs: LAN to W AN Message Nov 29 09:19:43 [FVS338] [kernel ] LAN2WAN[ACCEP T] IN=LAN OUT=W AN SRC=192.168.10.10 DST= 72.14.207.99 PR OTO=ICMP TYPE=8 CODE=0 Expl[...]
-
Pagina 188
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-16 System Logs and Error Messages v1.0, March 2008 DMZ to LAN Logs W AN to DMZ Logs T able B-23. Routing Logs: DMZ to W AN Message Nov 29 09:44:06 [FVS338] [ker nel] DMZ2LAN[DROP] IN=DMZ OUT=LAN SRC=192.168.20. 10 DST=192.168.1 0.10 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from DMZ to [...]
-
Pagina 189
Related Documents C-1 v1.0, March 2008 Appendix C Related Document s This appendix provides links to reference documents you c an use to gain a more com ple te understanding of the technolog ies used in your NETGEAR prod uct. Document Link Internet Netw orking and TCP/IP Addressing: http://documenta tion.netgear .com/r eference/enu/tcpip/index.htm [...]
-
Pagina 190
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual C-2 Related Documents v1.0, March 2008[...]
-
Pagina 191
Index-1 v1.0, March 2008 Index A Add LAN W AN Inbound Service scr een 4-9 , 4-15 Add LAN W AN Outbound Service screen 4-8 address reservation 3-10 AH VPN Policies, use with 5-7 ARP 3-6 Attack Checks Block TCP Flood 4-10 Respond T o Ping On Internet 4-10 Stealth Mode 4-10 Attack Checks screen 4-10 , 4-1 1 Attacks Notifica ti o n 6-19 Authentication [...]
-
Pagina 192
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-2 v1.0, March 2008 D date troubleshooting 7-7 Daylight Savings T ime setting 6-17 Dead Peer Detectio n 5-5 default configuration restoring 7-7 default firewall rules 4-1 Inbound 4-1 Outbound 4-2 Default Outbound Policy LAN W AN 4-7 denial of service attack 4-10 UDP flood 4-1 1 Denial of Servic[...]
-
Pagina 193
FVS338 ProSafe VPN Firewall 50 Reference Manual Index-3 v1.0, March 2008 technical specification s A-1 firewall access remote management 6- 9 Firewall Logs configuring 4-34 emailing of 4-32 Firewall Logs & E-mai l sc re en 4-33 , 6-19 firewall protection 4-1 firewall rules about 4-1 order ing 4-6 firmware upgrade 6-14 FQDN use in VPN tunnels 5-[...]
-
Pagina 194
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-4 v1.0, March 2008 examples of 4-23 L L2TP VPN T unnel 4-1 1 LAN configuration 3-1 ports and attached devices 6-25 LAN Security Checks UDP flood 4-1 1 LAN Setup Enable DHCP Server 3-3 Enable DNS Proxy 3-3 IP Address 3-2 IP Address Pool 3-3 IP Subnet Mask 3-3 WINS Server IP 3-3 LAN Setup screen[...]
-
Pagina 195
FVS338 ProSafe VPN Firewall 50 Reference Manual Index-5 v1.0, March 2008 P package contents 1-4 Packet Trace 6-28 Passwords changing 6-7 restoring 7-7 performance management 6- 1 Ping T roubleshooting TCP/IP 7-5 pinging an IP address 6-26 port filterin g 4-2 Outbound Rules 4- 2 Port Forwarding 4-2 , 4-4 , 6-4 Inbound Rules 4-4 port forwarding 6-4 p[...]
-
Pagina 196
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-6 v1.0, March 2008 blocking traffic 4-1 service blocking 4-2 services-based 4-2 S Schedule blocking traffic 4-21 rules, covered by 6-2 Schedule 1 screen 4-21 Security 1-2 Security Policy Editor scre en 5-15 Self Certificate format of 5-35 Request, generating 5-34 Self Certif icate request subm[...]
-
Pagina 197
FVS338 ProSafe VPN Firewall 50 Reference Manual Index-7 v1.0, March 2008 LEDs Never T urn Off 7-2 NTP 7-7 Power LED Not On 7-1 W eb configuration 7-2 T rusted Certificates 5-33 about 5-3 3 U UDP flood denial of service attack 4-1 1 upgrade firmware 6-14 upgrade router steps to 6-16 User Database configuring 5-22 XAUTH, use with 5-21 User Database s[...]
-
Pagina 198
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-8 v1.0, March 2008[...]