Page 146 / 212 Scroll up to view Page 141 - 145
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
5-38
Virtual Private Networking
v1.0, April 2007
d.
Under Virtual Adapter pull-down menu, select Preferred. The Internal Network IP
Address should be 0.0.0.0.
e.
Select your Internet Interface adapter from the Name pull-down menu.
3.
On the left-side of the menu, select Security Policy.
a.
Under Security Policy, Phase 1 Negotiation Mode, check the Aggressive Mode radio
button.
b.
Check the Enable Perfect Forward Secrecy (PFS) radio button, and select the Diffie-
Hellman Group 2 from the PFS Key Group pull-down menu.
c.
Enable Replay Detection should be checked.
4.
Click on Authentication (Phase 1) on the left-side of the menu and select Proposal 1. Enter the
Authentication values to match those in the ProSafe DGFV338 ModeConfig Record menu.
Note:
If no box is displayed for Internal Network IP Address, go to Options/
Global Policy Settings, and check the box for “Allow to Specify Internal
Network Address.”
Figure 5-26
Page 147 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Virtual Private Networking
5-39
v1.0, April 2007
5.
Click on Key Exchange (Phase 2) on the left-side of the menu and select Proposal 1. Enter the
values to match your configuration of the ProSafe DGFV338 ModeConfig Record menu. (The
SA Lifetime can be longer, such as 8 hours (28800 seconds)).
6.
Click the Save icon to save the Security Policy and close the VPN ProSafe VPN client.
Figure 5-27
Figure 5-28
Page 148 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
5-40
Virtual Private Networking
v1.0, April 2007
To test the connection:
1.
Right-click on the VPN client icon in the Windows toolbar and select Connect. The
connection policy you configured will appear; in this case “My Connections\modecfg_test”.
2.
Click on the connection. Within 30 seconds the message “Successfully connected to
MyConnections/modecfg_test will display and the VPN client icon in the toolbar will read
“On”.
3.
From the client PC, ping a computer on the ProSafe DGFV338 LAN.
.
Page 149 / 212
Router and Network Management
6-1
v1.0, April 2007
Chapter 6
Router and Network Management
This chapter describes how to use the network management features of your ProSafe Wireless
ADSL Modem VPN Firewall Router. These features can be found by clicking on the appropriate
heading in the Main Menu of the browser interface.
The ProSafe Wireless ADSL Modem VPN Firewall Router offers many tools for managing the
network traffic to optimize its performance. You can also control administrator access, be alerted
to important events requiring prompt action, monitor the firewall status, perform diagnostics, and
manage the firewall configuration file.
Performance Management
Performance management consists of controlling the traffic through the ProSafe DGFV338 so that
the necessary traffic gets through when there is a bottleneck and either reducing unnecessary
traffic or rescheduling some traffic to low-peak times to prevent bottlenecks from occurring in the
first place. The ProSafe DGFV338 has the necessary features and tools to help the network
manager accomplish these goals.
Wireless Firewall Features That Reduce Traffic
Features of the wireless firewall that can be called upon to decrease WAN-side loading are as
follows:
Service blocking
Block sites
Source MAC filtering
Page 150 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
6-2
Router and Network Management
v1.0, April 2007
Service Blocking
You can control specific outbound traffic (i.e., from LAN to WAN and from DMZ to WAN).
Outbound Services lists all existing rules for outbound traffic. If you have not defined any rules,
only the default rule will be listed. The default rule allows all outgoing traffic.
Each rule lets you specify the desired action for the connections covered by the rule:
BLOCK always
BLOCK by schedule, otherwise Allow
ALLOW always
ALLOW by schedule, otherwise Block
As you define your firewall rules, you can further refine their application according to the
following criteria:
LAN users
. These settings determine which computers on your network are affected by this
rule. Select the desired options:
Any: All PCs and devices on your LAN.
Single address: The rule will be applied to the address of a particular PC.
Address range: The rule is applied to a range of addresses.
Groups: The rule is applied to a Group. You use the Network Database to assign PCs to
Groups (see
“Groups and Hosts” on page 6-3
).
WAN Users
. These settings determine which Internet locations are covered by the rule, based
on their IP address.
Any: The rule applies to all Internet IP address.
Single address: The rule applies to a single Internet IP address.
Address range: The rule is applied to a range of Internet IP addresses.
Services
. You can specify the desired Services or applications to be covered by this rule. If the
desired service or application does not appear in the list, you must define it using the Services
menu (see
“Services” on page 6-3
).
Schedule
. You can specify whether the rule is to be applied on the Schedule 1, Schedule 2, or
Schedule 3 time schedule (see
“Schedule” on page 6-3
).
Note:
This feature is for Advanced Administrators only! Incorrect configuration will
cause serious problems.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top