Page 6 / 234 Scroll up to view Page 1 - 5
May 2004, 202-10030-02
ii
Contents
Testing Your Internet Connection
....................................................................................
3-9
Manually Configuring Your Internet Connection
...........................................................
3-10
How to Complete a Manual Configuration
.............................................................
3-11
Chapter 4
WAN and LAN Configuration
Configuring LAN IP Settings
...........................................................................................
4-1
Using the Router as a DHCP Server
........................................................................
4-2
How to Configure LAN TCP/IP Settings and View the DHCP Log
...........................
4-3
How to Configure Reserved IP Addresses
...............................................................
4-4
Configuring WAN Settings
..............................................................................................
4-5
Connect Automatically, as Required
........................................................................
4-6
Setting Up a Default DMZ Server
.............................................................................
4-7
How to Assign a Default DMZ Server
......................................................................
4-7
Multi-DMZ Servers
...................................................................................................
4-7
Responding to Ping on Internet WAN Port
...............................................................
4-8
MTU Size
.................................................................................................................
4-8
Port Speed
...............................................................................................................
4-8
Port Triggering
................................................................................................................
4-9
Port Triggering Rules
.............................................................................................
4-10
Adding a new Rule
.................................................................................................
4-10
Checking Operation and Status
.............................................................................
4-11
Configuring Dynamic DNS
............................................................................................
4-11
How to Configure Dynamic DNS
............................................................................
4-12
Using Static Routes
......................................................................................................
4-12
Static Route Example
.............................................................................................
4-12
How to Configure Static Routes
.............................................................................
4-13
Chapter 5
Protecting Your Network
Firewall Protection and Content Filtering Overview
........................................................
5-1
Using the Block Sites Menu to Screen Content
..............................................................
5-1
Apply Keyword Blocking to Groups
..........................................................................
5-3
Services and Rules Regulate Inbound and Outbound Traffic
.........................................
5-3
Defining a Service
....................................................................................................
5-4
Using Inbound/Outbound Rules to Block or Allow Services
.....................................
5-5
Examples of Using Services and Rules to Regulate Traffic
...........................................
5-7
Page 7 / 234
Contents
iii
May 2004, 202-10030-02
Inbound Rules (Port Forwarding)
.............................................................................
5-7
Example: Port Forwarding to a Local Public Web Server
..................................
5-8
Example: Port Forwarding for Videoconferencing
.............................................
5-8
Example: Port Forwarding for VPN Tunnels when NAT is Off
...........................
5-9
Outbound Rules (Service Blocking or Port Filtering)
..............................................
5-10
Outbound Rule Example: Blocking Instant Messaging
....................................
5-10
Other Rules Considerations
.........................................................................................
5-11
Order of Precedence for Rules
..............................................................................
5-11
Rules Menu Options
...............................................................................................
5-12
Using a Schedule to Block or Allow Content or Traffic
.................................................
5-13
Setting the Time Zone
............................................................................................
5-14
Set Clock
................................................................................................................
5-14
Enable NTP (Network Time Protocol)
....................................................................
5-14
User-defined NTP Server
.......................................................................................
5-15
Getting E-Mail Notifications of Event Logs and Alerts
..................................................
5-15
Viewing Logs of Web Access or Attempted Web Access
.............................................
5-17
What to Include in the Event Log
...........................................................................
5-19
Chapter 6
Virtual Private Networking
Overview of FVL328 Policy-Based VPN Configuration
..................................................
6-1
Using Policies to Manage VPN Traffic
.....................................................................
6-1
Using Automatic Key Management
..........................................................................
6-2
IKE Policies’ Automatic Key and Authentication Management
................................
6-3
VPN Policy Configuration for Auto Key Negotiation
.................................................
6-6
VPN Policy Configuration for Manual Key Exchange
...............................................
6-9
Using Digital Certificates for IKE Auto-Policy Authentication
.......................................
6-14
Certificate Revocation List (CRL)
...........................................................................
6-15
How to Use the VPN Wizard to Configure a VPN Tunnel
.............................................
6-15
Walk-Through of Configuration Scenarios
....................................................................
6-18
VPNC Scenario 1: Gateway-to-Gateway with Preshared Secrets
.........................
6-19
FVL328 Scenario 1: How to Configure the IKE and VPN Policies
.........................
6-21
How to Check VPN Connections
...........................................................................
6-26
FVL328 Scenario 2: Authenticating with RSA Certificates
.....................................
6-27
Page 8 / 234
May 2004, 202-10030-02
iv
Contents
Chapter 7
Managing Your Network
Protecting Access to Your FVL328 Firewall
....................................................................
7-1
How to Change the Built-In Password
.....................................................................
7-1
How to Change the Administrator Login Timeout
....................................................
7-2
Internet Traffic
.................................................................................................................
7-3
Internet Traffic Limit
..................................................................................................
7-3
Enable Monthly Limit
................................................................................................
7-4
Internet Traffic Statistics
...........................................................................................
7-4
Traffic by Protocol
....................................................................................................
7-5
Network Database
..........................................................................................................
7-5
Advantages of the Network Database
......................................................................
7-6
Known PCs and Devices
..........................................................................................
7-7
Operations
................................................................................................................
7-7
Network Management
....................................................................................................
7-8
How to Configure Remote Management
..................................................................
7-8
Viewing Router Status and Usage Statistics
............................................................
7-9
Viewing Attached Devices
......................................................................................
7-12
Viewing, Selecting, and Saving Logged Information
..............................................
7-13
Changing the Include in Log Settings
..............................................................
7-14
Enabling the Syslog Feature
...........................................................................
7-15
Enabling Security Event E-mail Notification
.................................................................
7-15
Backing Up, Restoring, or Erasing Your Settings
.........................................................
7-17
How to Back Up the FVL328 Configuration to a File
..............................................
7-17
How to Restore a Configuration from a File
...........................................................
7-18
How to Erase the Configuration
.............................................................................
7-18
Running Diagnostic Utilities and Rebooting the Router
................................................
7-19
Upgrading the Router’s Firmware
.................................................................................
7-20
How to Upgrade the Router
...................................................................................
7-20
Chapter 8
Troubleshooting
Basic Functions
..............................................................................................................
8-1
Power LED Not On
...................................................................................................
8-2
Test LED Never Turns On or Test LED Stays On
.....................................................
8-2
Local or Internet Port Link LEDs Not On
..................................................................
8-3
Page 9 / 234
Contents
v
May 2004, 202-10030-02
Troubleshooting the Web Configuration Interface
..........................................................
8-3
Troubleshooting the ISP Connection
..............................................................................
8-4
Troubleshooting a TCP/IP Network Using a Ping Utility
.................................................
8-5
How to Test the LAN Path to Your Firewall
..............................................................
8-6
How to Test the Path from Your PC to a Remote Device
.........................................
8-6
Restoring the Default Configuration and Password
........................................................
8-7
How to Use the Default Reset Button
......................................................................
8-7
Problems with Date and Time
.........................................................................................
8-8
Appendix A
Technical Specifications
Appendix B
Networks, Routing, and Firewall Basics
Related Publications
......................................................................................................
B-1
Basic Router Concepts
..................................................................................................
B-1
What is a Router?
...................................................................................................
B-1
Routing Information Protocol
...................................................................................
B-2
IP Addresses and the Internet
.................................................................................
B-2
Netmask
..................................................................................................................
B-4
Subnet Addressing
..................................................................................................
B-4
Private IP Addresses
...............................................................................................
B-7
Single IP Address Operation Using NAT
.................................................................
B-7
MAC Addresses and Address Resolution Protocol
.................................................
B-8
Related Documents
.................................................................................................
B-9
Domain Name Server
..............................................................................................
B-9
IP Configuration by DHCP
......................................................................................
B-9
Internet Security and Firewalls
....................................................................................
B-10
What is a Firewall?
................................................................................................
B-10
Stateful Packet Inspection
.....................................................................................
B-10
Denial of Service Attack
.........................................................................................
B-11
Ethernet Cabling
...........................................................................................................
B-11
Category 5 Cable Quality
.......................................................................................
B-11
Inside Twisted Pair Cables
....................................................................................
B-12
Uplink Switches, Crossover Cables, and MDI/MDIX Switching
............................
B-13
Page 10 / 234
May 2004, 202-10030-02
vi
Contents
Appendix C
Preparing Your Network
What You Will Need Before You Begin
..........................................................................
C-1
LAN Hardware Requirements
.................................................................................
C-1
LAN Configuration Requirements
...........................................................................
C-2
Internet Configuration Requirements
......................................................................
C-2
Where Do I Get the Internet Configuration Parameters?
.................................
C-2
Worksheet for Recording Your Internet Connection Information
.............................
C-3
Preparing Your Computers for TCP/IP Networking
.......................................................
C-4
Configuring Windows 95, 98, and Me for TCP/IP Networking
.......................................
C-5
Install or Verify Windows Networking Components
.................................................
C-5
Enabling DHCP to Automatically Configure TCP/IP Settings
.................................
C-6
Selecting Windows’ Internet Access Method
....................................................
C-7
Verifying TCP/IP Properties
....................................................................................
C-7
Configuring Windows NT, 2000 or XP for IP Networking
...............................................
C-8
Installing or Verifying Windows Networking Components
.......................................
C-8
Verifying TCP/IP Properties
....................................................................................
C-8
Configuring the Macintosh for TCP/IP Networking
........................................................
C-9
MacOS 8.6 or 9.x
....................................................................................................
C-9
MacOS X
...............................................................................................................
C-10
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-10
Restarting the Network
................................................................................................
C-11
Appendix D
Firewall Log Formats
Action List
......................................................................................................................
D-1
Field List
........................................................................................................................
D-1
Outbound Log
................................................................................................................
D-1
Inbound Log
...................................................................................................................
D-2
Other IP Traffic
..............................................................................................................
D-2
Router Operation
...........................................................................................................
D-3
Other Connections and Traffic to this Router
................................................................
D-4
DoS Attack/Scan
...........................................................................................................
D-4
Access Block Site
..........................................................................................................
D-6
All Web Sites and News Groups Visited
........................................................................
D-6
System Admin Sessions
................................................................................................
D-6

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top