Page 111 / 149 Scroll up to view Page 106 - 110
Reference Manual for the Model FR114P, FR114W and FM114P Cable/DSL ProSafe Firewall
Advanced Configuration
9-7
From the Main Menu of the browser interface, under Advanced, click on Static Routes to view the
Static Routes menu, shown in
Figure 9-3
.
Figure 9-3.
Static Routes Summary Table
To add or edit a Static Route, click the Add or Edit button to open the Edit Menu, shown in
Figure 9-4
.
Figure 9-4.
Static Route Entry and Edit Menu
3.
Type a route name for this static route in the Route Name box under the table.
(This is for identification purpose only.)
4.
Select Active to make this route effective.
5.
Select Private if you want to limit access to the LAN only. The static route will not be reported
in RIP.
6.
Type the Destination IP Address of the final destination network.
7.
Type the IP Subnet Mask for this destination network.
If the destination is a single host, type 255.255.255.255.
8.
Type the Gateway IP Address that will be used to reach the destination network.
Page 112 / 149
Reference Manual for the Model FR114P, FR114W and FM114P Cable/DSL ProSafe Firewall
9-8
Advanced Configuration
If the network is reached through another router on the same LAN segment as the
firewall, type that router’s LAN IP address.
If the network is another IP subnet located on your physical LAN, type your firewall’s
LAN IP address.
9.
Type a number between 2 and 15 as the Metric value.
This represents the number of routers between your network and the destination. Usually, a
setting of 2 or 3 works, but if this is a direct connection, set it to 2.
10.
Click Apply to have the static route entered into the table.
Static Route Example
As an example of when a static route is needed, consider the following case:
Your primary Internet access is through a cable modem to an ISP.
You have an ISDN router on your home network for connecting to the company where
you are employed. This router’s address on your LAN is 192.168.0.100.
Your company’s network is 134.177.0.0.
When you first configured your firewall, two implicit static routes were created. A default route
was created with your ISP as the gateway, and a second static route was created to your local
network for all 192.168.0.x addresses. With this configuration, if you attempt to access a device on
the 134.177.0.0 network, your firewall will forward your request to the ISP. The ISP forwards your
request to the company where you are employed, and the request will likely be denied by the
company’s firewall.
In this case you must define a static route, telling your firewall that 134.177.0.0 should be accessed
through the ISDN router at 192.168.0.100. The static route would look like
Figure 9-4
.
In this example:
The Destination IP Address and IP Subnet Mask fields specify that this static route applies to
all 134.177.x.x addresses.
The Gateway IP Address fields specifies that all traffic for these addresses should be
forwarded to the ISDN router at 192.168.0.100.
A Metric value of 1 will work since the ISDN router is on the LAN.
Private is selected only as a precautionary security measure in case RIP is activated.
Page 113 / 149
Reference Manual for the Model FR114P, FR114W and FM114P Cable/DSL ProSafe Firewall
Advanced Configuration
9-9
Remote Management
Using the Remote Management page, you can allow a user or users on the Internet to configure,
upgrade and check the status of your NETGEAR Cable/DSL ProSafe VPN Firewall.
To configure your firewall for Remote Management:
1.
Select the Allow Remote Management check box.
2.
Specify what external addresses will be allowed to access the firewall’s remote management.
For security, NETGEAR recommends that you restrict access to as few external IP addresses
as practical.
a.
To allow access from any IP address on the Internet, select Everyone.
b.
To allow access from a range of IP addresses on the Internet, select IP address range.
Enter a beginning and ending IP address to define the allowed range.
c.
To allow access from a single IP address on the Internet, select Only this PC.
Enter the IP address that will be allowed access.
3.
Specify the Port Number that will be used for accessing the management interface.
Web browser access normally uses the standard HTTP service port 80. For greater security,
you can change the remote management web interface to a custom port by entering that
number in the box provided. Choose a number between 1024 and 65535, but do not use the
number of any common service port. The default is 8080, which is a common alternate for
HTTP.
4.
Click Apply to have your changes take effect.
When accessing your router from the Internet, you will type your router's WAN IP address into
your browser's Address (in IE) or Location (in Netscape) box, followed by a colon (:) and the
custom port number. For example, if your external address is 134.177.0.123 and you use port
number 8080, enter in your browser:
Note:
Be sure to change the router's default configuration password to a very secure
password. The ideal password should contain no dictionary words from any language,
and should be a mixture of letters (both upper and lower case), numbers, and symbols.
Your password can be up to 30 characters.
Page 114 / 149
Reference Manual for the Model FR114P, FR114W and FM114P Cable/DSL ProSafe Firewall
9-10
Advanced Configuration
Page 115 / 149
Troubleshooting
10-1
Chapter 10
Troubleshooting
This chapter gives information about troubleshooting your FR114P, FR114W and FM114P Cable/
DSL ProSafe Firewalls. For the common problems listed, go to the section indicated.
Is the firewall on?
Have I connected the firewall correctly?
Go to
“Basic Functioning“ on page 10-1
.
I can’t access the firewall’s configuration with my browser.
Go to
“Troubleshooting the Web Configuration Interface“ on page 10-4
.
I’ve configured the firewall but I can’t access the Internet.
Go to
“Troubleshooting the ISP Connection“ on page 10-5
.
I can’t remember the firewall’s configuration password.
I want to clear the configuration and start over again.
Go to
“Restoring the Default Configuration and Password“ on page 10-8
.
Basic Functioning
After you turn on power to the firewall, the following sequence of events should occur:
1.
When power is first applied, verify that the Power LED is on.
2.
Verify that the Test LED lights within a few seconds, indicating that the self-test procedure is
running.
3.
After approximately 10 seconds, verify that:
a.
The Test LED is not lit.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top