Page 121 / 414 Scroll up to view Page 116 - 120
Wireless Configuration and Security
121
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Note:
For a list of other Wi-Fi-certified products available from NETGEAR,
go to
.
To enable WPS and initiate the WPS process on the wireless VPN firewall:
1.
Select
Network Configuration > Wireless Settings > Wireless Profiles
.
The Wireless
Profiles screen displays (see
Figure 54
on page 112).
2.
On the Wireless Profiles screen, to the right of the Wireless Profiles tab, click the
WPS
option arrow. The WPS screen displays:
Figure 58.
3.
From the Select Wireless Profile SSID drop-down list, select the name of the SSID for which
you want to enable WPS. The wireless profile with which the SSID is associated needs to be
configured for WPA, WPA, or WPA+WPA2 security in order to be displayed as a selection in
the drop-down list.
4.
From the WPS Status drop-down list, select
Enabled
to enable the WPS feature.
5.
Click
Apply
to save your changes.
Note:
The Security, Authentication, and Encryption fields are nonconfigurable
fields that are for information only.
Page 122 / 414
Wireless Configuration and Security
122
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
6.
In the WPS Setup Method section of the screen, use one of the following methods to initiate
the WPS process for a wireless device:
PIN method:
a.
Collect the pin of the wireless device.
b.
In the Station PIN field, enter the pin.
c.
Click the
PIN
button.
Push button configuration (PBC) method:
a.
Click the
PBC
button.
b.
Within 2 minutes, press the
WPS
button on your wireless device to enable the
device to connect the access point of the wireless VPN firewall, or follow the
WPS instructions that came with the device.
With either method, the wireless VPN firewall tries to communicate with the wireless
device, set the wireless security for the wireless device, and allow it to join the wireless
network.
Note:
There is no physical WPS push button on the wireless VPN firewall.
Configure Advanced Radio Settings
To configure advanced radio settings:
1.
Select
Network Configuration > Wireless Settings > Radio Settings
.
The Radio
Settings screen displays (see
Figure 52
on page 105).
2.
On the Radio Settings screen, to the right of the Wireless Profiles tab, click the
Advanced
option arrow. The Advanced Wireless screen displays:
Figure 59.
Page 123 / 414
Wireless Configuration and Security
123
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
3.
Specify the settings as explained in the following table:
4.
Click
Apply
to save your settings.
Table 30.
Advanced Wireless screen settings
Setting
Description
Beacon Interval
Enter an interval between 40 ms and 3500 ms for each beacon transmission,
which allows the wireless VPN firewall to synchronize the wireless network. The
default setting is 100.
DTIM Interval
Enter the Delivery Traffic Indication Message (DTIM) interval, also referred to
as the data beacon rate, which indicates the period for the beacon DTIM in
multiples of beacon intervals. This value needs to be between 1 and 255. The
default setting is 2.
RTS Threshold
Enter the Request to Send (RTS) threshold. The default setting is 2346 bytes.
If the packet size is equal to or less than the RTS threshold, the wireless VPN
firewall uses the Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) mechanism, and the data frame is transmitted immediately after
the silence period.
If the packet size is larger than the RTS threshold, the wireless VPN firewall
uses the CSMA with Collision Avoidance (CSMA/CA) mechanism. In this
situation, the transmitting station sends an RTS packet to the receiving station
and waits for the receiving station to return a Clear to Send (CTS) packet before
sending the actual packet data. This method improves the performance but
reduces the throughput.
Fragmentation Threshold
Enter the maximum packet size that is used for the fragmentation of data
packets. Packets that are larger than the specified fragmentation length are
broken up into smaller packets before being transmitted. The fragmentation
threshold needs to be an even number. The default setting is 2346 bytes.
Preamble Mode
Specify the preamble mode by making a selection from the drop-down list:
Long
. A long transmit preamble might provide a more reliable connection or
a slightly longer range. This is the default mode.
Short
. A short transmit preamble gives better performance.
Protection Mode
Specify the Clear to Send (CTS)-to-self protection mode by making a selection
from the drop-down list:
None
. CTS-to-self protection mode is disabled. This is the default mode.
CTS-to-Self-Protection
. CTS-to-self protection mode is enabled. This mode
increases the performance but reduces the throughput slightly.
Power Save Enable
To enable the Wi-Fi Multimedia (WMM) Powersave feature, select the
Power
Save Enable
check box. This feature saves power for battery-powered
equipment by increasing the efficiency and flexibility of data transmission. Clear
the check box to disable the feature, which is the default setting.
Page 124 / 414
Wireless Configuration and Security
124
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Test Basic Wireless Connectivity
After you have configured the wireless VPN firewall as explained in the previous sections,
test your wireless clients for wireless connectivity before you place the wireless VPN firewall
at its permanent position.
To test for wireless connectivity:
1.
Configure the 802.11b/g/n wireless clients so that they all have the same SSID that you
have configured on the wireless VPN firewall. Make sure that the wireless mode on the
wireless VPN firewall supports the wireless capacity of the wireless clients. (For
example, 802.11b-compliant devices cannot connect to the wireless VPN firewall if the
wireless mode is set to ng.)
2.
Verify that your wireless clients have a link to the wireless VPN firewall. If you have enabled
the DHCP server on the wireless VPN firewall (see
Configure a VLAN Profile
on page 56
(for IPv4) and
Manage the IPv6 LAN
on page 70), verify that your wireless clients are able
to obtain an IP address through DHCP from the wireless VPN firewall.
3.
Verify network connectivity by using a browser such as Internet Explorer 7.0 or later or
Mozilla Firefox 4.0 or later to browse the Internet, or check for file and printer access on your
network.
If you have trouble connecting to the wireless VPN firewall, try to connect without security by
selecting
OPEN
from the Security drop-down list on the Edit Wireless Profiles screen for the
profile that you are using. If that does not help you to solve the connection problem, see
Chapter 11, Troubleshooting
.
Page 125 / 414
125
5
5.
Firewall Protection
This chapter describes how to use the firewall features of the wireless VPN firewall to protect
your network. This chapter contains the following sections:
About Firewall Protection
Overview of Rules to Block or Allow Specific Kinds of Traffic
Configure LAN WAN Rules
Configure DMZ WAN Rules
Configure LAN DMZ Rules
Examples of Firewall Rules
Configure Other Firewall Features
Services, Bandwidth Profiles, and QoS Profiles
Configure Content Filtering
Set a Schedule to Block or Allow Specific Traffic
Enable Source MAC Filtering
Set Up IP/MAC Bindings
Configure Port Triggering
Configure Universal Plug and Play
About Firewall Protection
A firewall protects one network (the trusted network, such as your LAN) from another (the
untrusted network, such as the Internet), while allowing communication between the two.
You can further segment keyword blocking to certain known groups. For information about
how to set up LAN groups, see
Manage IPv4 Groups and Hosts (IPv4 LAN Groups)
on
page 64.
For IPv4, a firewall incorporates the functions of a Network Address Translation (NAT) router,
protects the trusted network from hacker intrusions or attacks, and controls the types of
traffic that can flow between the Internet, DMZ, and LAN. Unlike simple NAT routers, a
firewall uses a process called stateful packet inspection to protect your network from attacks
and intrusions. NAT performs a very limited stateful inspection in that it considers whether

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top