ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
viii
Contents
v1.0, September 2007
Chapter 3
Configuring Wireless Connectivity
Observing Performance, Placement, and Range Guidelines
.........................................
3-1
Implementing Appropriate Wireless Security
..................................................................
3-2
Understanding Wireless Settings
...................................................................................
3-3
Security Check List for SSID and WEP Settings
......................................................
3-7
Setting Up and Testing Basic Wireless Connectivity
................................................
3-8
Restricting Wireless Access by MAC Address
.........................................................
3-9
Configuring WEP Security Settings
........................................................................
3-10
Configuring WPA with RADIUS
..............................................................................
3-12
Configuring WPA2 with RADIUS
............................................................................
3-14
Configuring WPA and WPA2 with RADIUS
............................................................
3-15
Configuring WPA-PSK
...........................................................................................
3-17
Configuring WPA2-PSK
.........................................................................................
3-18
Configuring WPA-PSK and WPA2-PSK
.................................................................
3-20
Chapter 4
Firewall Protection and Content Filtering
Firewall Protection and Content Filtering Overview
........................................................
4-1
Block Sites
......................................................................................................................
4-1
Using Rules to Block or Allow Specific Kinds of Traffic
..................................................
4-4
Inbound Rules (Port Forwarding)
.............................................................................
4-6
Outbound Rules (Service Blocking)
.........................................................................
4-8
Order of Precedence for Rules
................................................................................
4-9
Default DMZ Server
...............................................................................................
4-10
Attack Checks
........................................................................................................
4-11
Services
........................................................................................................................
4-12
Using a Schedule to Block or Allow Specific Traffic
......................................................
4-13
Getting E-Mail Notifications of Firewall Logs
................................................................
4-14
Chapter 5
Basic Virtual Private Networking
Overview of VPN Configuration
......................................................................................
5-2
Client-to-Gateway VPN Tunnels
..............................................................................
5-2
Gateway-to-Gateway VPN Tunnels
.........................................................................
5-2
Planning a VPN
..............................................................................................................
5-3
VPN Tunnel Configuration
..............................................................................................
5-4