Page 6 / 212 Scroll up to view Page 1 - 5
202-10098-01, April 2005
vi
Contents
Using the Smart Setup Wizard
.....................................................................................
3-10
How to Manually Configure Your Internet Connection
..................................................
3-11
Chapter 4
Firewall Protection and
Content Filtering
Firewall Protection and Content Filtering Overview
........................................................
4-1
Block Sites
......................................................................................................................
4-2
Using Rules to Block or Allow Specific Kinds of Traffic
..................................................
4-3
Inbound Rules (Port Forwarding)
.............................................................................
4-6
Inbound Rule Example: A Local Public Web Server
..........................................
4-6
Inbound Rule Example: Allowing a Videoconference from Restricted Addresses 4-7
Considerations for Inbound Rules
.....................................................................
4-8
Outbound Rules (Service Blocking)
.........................................................................
4-8
Outbound Rule Example: Blocking Instant Messenger
.....................................
4-9
Order of Precedence for Rules
..............................................................................
4-10
Services
........................................................................................................................
4-11
Using a Schedule to Block or Allow Specific Traffic
......................................................
4-13
Time Zone
..............................................................................................................
4-14
Getting E-Mail Notifications of Event Logs and Alerts
..................................................
4-15
Viewing Logs of Web Access or Attempted Web Access
.............................................
4-17
Syslog
....................................................................................................................
4-18
Chapter 5
Basic Virtual Private Networking
Overview of VPN Configuration
......................................................................................
5-2
Client-to-Gateway VPN Tunnels
..............................................................................
5-2
Gateway-to-Gateway VPN Tunnels
.........................................................................
5-2
Planning a VPN
..............................................................................................................
5-3
VPN Tunnel Configuration
..............................................................................................
5-5
How to Set Up a Client-to-Gateway VPN Configuration
.................................................
5-5
Step 1: Configuring the Client-to-Gateway VPN Tunnel on the FVS114
..................
5-6
Step 2: Configuring the NETGEAR ProSafe VPN Client on the Remote PC
...........
5-9
Monitoring the Progress and Status of the VPN Client Connection
.......................
5-16
Transferring a Security Policy to Another Client
....................................................
5-17
Exporting a Security Policy
..............................................................................
5-17
Importing a Security Policy
..............................................................................
5-18
How to Set Up a Gateway-to-Gateway VPN Configuration
..........................................
5-20
Page 7 / 212
Contents
vii
202-10098-01, April 2005
Procedure to Configure a Gateway-to-Gateway VPN Tunnel
................................
5-21
VPN Tunnel Control
......................................................................................................
5-26
Activating a VPN Tunnel
........................................................................................
5-26
Start Using a VPN Tunnel to Activate It
...........................................................
5-26
Using the VPN Status Page to Activate a VPN Tunnel
....................................
5-26
Activate the VPN Tunnel by Pinging the Remote Endpoint
.............................
5-27
Verifying the Status of a VPN Tunnel
.....................................................................
5-29
Deactivating a VPN Tunnel
....................................................................................
5-30
Using the Policy Table on the VPN Policies Page to Deactivate a VPN Tunnel 5-30
Using the VPN Status Page to Deactivate a VPN Tunnel
...............................
5-31
Deleting a VPN Tunnel
...........................................................................................
5-32
Chapter 6
Advanced Virtual Private Networking
Overview of FVS114 Policy-Based VPN Configuration
..................................................
6-1
Using Policies to Manage VPN Traffic
.....................................................................
6-2
Using Automatic Key Management
..........................................................................
6-2
IKE Policies’ Automatic Key and Authentication Management
................................
6-3
VPN Policy Configuration for Auto Key Negotiation
.................................................
6-5
VPN Policy Configuration for Manual Key Exchange
...............................................
6-9
Using Digital Certificates for IKE Auto-Policy Authentication
.......................................
6-13
Certificate Revocation List (CRL)
...........................................................................
6-14
Walk-Through of Configuration Scenarios on the FVS114
...........................................
6-14
VPN Consortium Scenario 1:
Gateway-to-Gateway with Preshared Secrets
.......................................................
6-15
FVS114 Scenario 1: FVS114 to Gateway B IKE and VPN Policies
.......................
6-16
How to Check VPN Connections
...........................................................................
6-21
Testing the Gateway A FVS114 LAN and the Gateway B LAN
.......................
6-21
FVS114 Scenario 2: FVS114 to FVS114 with RSA Certificates
.............................
6-22
Chapter 7
Maintenance
Viewing VPN Firewall Status Information
.......................................................................
7-1
Viewing a List of Attached Devices
.................................................................................
7-5
Upgrading the Firewall Software
....................................................................................
7-5
Configuration File Management
.....................................................................................
7-6
Backing Up the Configuration
..................................................................................
7-7
Restoring the Configuration
.....................................................................................
7-7
Page 8 / 212
202-10098-01, April 2005
viii
Contents
Erasing the Configuration
.........................................................................................
7-7
Changing the Administrator Password
...........................................................................
7-8
Diagnostics
.....................................................................................................................
7-8
Chapter 8
Advanced Configuration
WAN Setup
.....................................................................................................................
8-1
Default DMZ Server
.................................................................................................
8-2
Respond to Ping on Internet WAN Port
...................................................................
8-3
How to Configure Dynamic DNS
....................................................................................
8-3
Using the LAN IP Setup Options
....................................................................................
8-5
Configuring LAN TCP/IP Setup Parameters
............................................................
8-5
Using the Firewall as a DHCP server
.......................................................................
8-7
Using Address Reservation
......................................................................................
8-7
Configuring Static Routes
...............................................................................................
8-8
Static Route Example
.............................................................................................
8-10
Enabling Remote Management Access
.......................................................................
8-10
UPnP
............................................................................................................................
8-13
Chapter 9
Troubleshooting
Basic Functioning
...........................................................................................................
9-1
Power LED Not On
...................................................................................................
9-1
LEDs Never Turn Off
................................................................................................
9-2
LAN or Internet Port LEDs Not On
...........................................................................
9-2
Troubleshooting the Web Configuration Interface
..........................................................
9-3
Troubleshooting the ISP Connection
..............................................................................
9-4
Troubleshooting a TCP/IP Network Using a Ping Utility
.................................................
9-5
Testing the LAN Path to Your Firewall
......................................................................
9-5
Testing the Path from Your PC to a Remote Device
................................................
9-6
Restoring the Default Configuration and Password
........................................................
9-7
Problems with Date and Time
.........................................................................................
9-7
Appendix A
Technical Specifications
Appendix B
Network, Routing, and Firewall Basics
Related Publications
......................................................................................................
B-1
Basic Router Concepts
..................................................................................................
B-1
Page 9 / 212
Contents
ix
202-10098-01, April 2005
What is a Router?
...................................................................................................
B-2
Routing Information Protocol
...................................................................................
B-2
IP Addresses and the Internet
.......................................................................................
B-2
Netmask
..................................................................................................................
B-4
Subnet Addressing
..................................................................................................
B-5
Private IP Addresses
...............................................................................................
B-7
Single IP Address Operation Using NAT
.......................................................................
B-8
MAC Addresses and Address Resolution Protocol
.................................................
B-9
Related Documents
.................................................................................................
B-9
Domain Name Server
..............................................................................................
B-9
IP Configuration by DHCP
...........................................................................................
B-10
Internet Security and Firewalls
....................................................................................
B-10
What is a Firewall?
.................................................................................................
B-11
Stateful Packet Inspection
...............................................................................
B-11
Denial of Service Attack
..................................................................................
B-11
Ethernet Cabling
...........................................................................................................
B-11
Category 5 Cable Quality
......................................................................................
B-12
Inside Twisted Pair Cables
....................................................................................
B-13
Uplink Switches, Crossover Cables, and MDI/MDIX Switching
............................
B-14
Appendix C
Virtual Private Networking
What is a VPN?
.............................................................................................................
C-1
What Is IPSec and How Does It Work?
.........................................................................
C-2
IPSec Security Features
.........................................................................................
C-2
IPSec Components
.................................................................................................
C-2
Encapsulating Security Payload (ESP)
...................................................................
C-3
Authentication Header (AH)
....................................................................................
C-4
IKE Security Association
.........................................................................................
C-4
Mode
.................................................................................................................
C-5
Key Management
....................................................................................................
C-6
Understand the Process Before You Begin
...................................................................
C-6
VPN Process Overview
.................................................................................................
C-7
Network Interfaces and Addresses
.........................................................................
C-7
Interface Addressing
.........................................................................................
C-7
Firewalls
...........................................................................................................
C-8
Page 10 / 212
202-10098-01, April 2005
x
Contents
VPN Tunnel Between Gateways
.............................................................................
C-8
VPNC IKE Security Parameters
..................................................................................
C-10
VPNC IKE Phase I Parameters
.............................................................................
C-10
VPNC IKE Phase II Parameters
............................................................................
C-11
Testing and Troubleshooting
........................................................................................
C-11
Additional Reading
......................................................................................................
C-11
Appendix D
Preparing Your Network
Preparing Your Computers for TCP/IP Networking
.......................................................
D-1
Configuring Windows 95, 98, and Me for TCP/IP Networking
.......................................
D-2
Install or Verify Windows Networking Components
.................................................
D-2
Enabling DHCP to Automatically Configure TCP/IP Settings
.................................
D-4
Selecting Windows’ Internet Access Method
..........................................................
D-6
Verifying TCP/IP Properties
....................................................................................
D-6
Configuring Windows NT4, 2000 or XP for IP Networking
............................................
D-7
Install or Verify Windows Networking Components
.................................................
D-7
Enabling DHCP to Automatically Configure TCP/IP Settings
.................................
D-8
DHCP Configuration of TCP/IP in Windows XP
.....................................................
D-8
DHCP Configuration of TCP/IP in Windows 2000
................................................
D-10
DHCP Configuration of TCP/IP in Windows NT4
..................................................
D-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4
..............................
D-15
Configuring the Macintosh for TCP/IP Networking
......................................................
D-16
MacOS 8.6 or 9.x
..................................................................................................
D-16
MacOS X
...............................................................................................................
D-16
Verifying TCP/IP Properties for Macintosh Computers
.........................................
D-17
Verifying the Readiness of Your Internet Account
.......................................................
D-18
Are Login Protocols Used?
...................................................................................
D-18
What Is Your Configuration Information?
..............................................................
D-18
Obtaining ISP Configuration Information for Windows Computers
.......................
D-19
Obtaining ISP Configuration Information for Macintosh Computers
.....................
D-20
Restarting the Network
................................................................................................
D-21
Glossary
List of Glossary Terms
...................................................................................................
G-1
Numeric
.........................................................................................................................
G-1
A
....................................................................................................................................
G-1

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top