Page 386 / 414 Scroll up to view Page 381 - 385
Default Settings and Technical Specifications
386
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
The following table shows the IPSec VPN specifications for the wireless VPN firewall:
Dimensions and weight
Dimensions (W x H x D)
19 x 12.5 x 3.5 cm (7.5 X 4.9 X 1.4 in)
Weight
0.59 kg (1.3 lb)
Environmental specifications
Operating temperatures
0º to 40ºC
32º to 104ºF
Storage temperatures
–20º to 70ºC
–4º to 158ºF
Operating humidity
90% maximum relative humidity, noncondensing
Storage humidity
95% maximum relative humidity, noncondensing
Electromagnetic emissions
Meets requirements of
FCC Part 15 Class B
VCCI Class B
EN 55 022 (CISPR 22), Class B
Wired compliance
See
Appendix C, Notification of Compliance (Wired)
.
Wireless compliance
See
Appendix D, Notification of Compliance (Wireless)
.
Interface specifications
LAN
8 LAN autosensing 10/100/1000BASE-T, RJ-45, one of
which is a configurable DMZ interface
WAN
1 WAN autosensing 10/100/1000BASE-T, RJ-45
1 administrative console port
RS-232
Table 93.
Wireless VPN firewall IPSec VPN specifications
Setting
Specification
Network Management
Web-based configuration and status monitoring
Number of concurrent users supported
12
IPSec authentication algorithm
SHA-1, MD5
Table 92.
Wireless VPN firewall physical and technical specifications (continued)
Feature
Specification
Page 387 / 414
Default Settings and Technical Specifications
387
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
The following table shows the SSL VPN specifications for the wireless VPN firewall:
The following table shows the wireless specifications for the wireless VPN firewall:
IPSec encryption algorithm
DES, 3DES, AES-128, AES-192, AES-256
IPSec key exchange
IKE, manual key, pre-shared key, X.509 certificate
IPSec authentication types
Local user database, RADIUS PAP, RADIUS CHAP
IPSec certificates supported
CA certificates, self-signed certificate
Table 94.
Wireless VPN firewall SSL VPN specifications
Setting
Specification
Network Management
Web-based configuration and status monitoring
Number of concurrent users supported
5
SSL versions
SSLv3, TLS1.0
SSL encryption algorithm
DES, 3DES, ARC4, AES-128, AES-192, AES-256
SSL message integrity
MD5, SHA-1, MAC-MD5/SHA-1, HMAC-MD5/SHA-1
SSL authentication types
Local user database, RADIUS-PAP, RADIUS-CHAP,
RADIUS-MSCHAP, RADIUS-MSCHAPv2, WiKID-PAP,
WiKID-CHAP, MIAS-PAP, MIAS-CHAP, NT domain, Active Directory,
LDAP
SSL certificates supported
CA certificates, self-signed certificate
Table 95.
Wireless VPN firewall wireless specifications
Setting
Specification
802.11bg data rates
1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps, and auto-rate capable
802.11ng/n data rates
Data rates for a channel width of 20 MHz and a (short) guard interval of 400 ms:
Best (automatic), 7.2 Mbps, 14.4 Mbps, 21.7 Mbps, 28.9 Mbps, 43.3 Mbps,
57.8 Mbps, 65 Mbps, 72.2 Mbps, 14.44 Mbps, 28.88 Mbps, 43.33 Mbps,
57.77 Mbps, 86.66 Mbps, 115.56 Mbps, 130 Mbps, 144.44 Mbps
Data rates for a channel width of 40 MHz and a (short) guard interval of 400 ms:
Best (automatic), 15 Mbps, 30 Mbps, 45 Mbps, 60 Mbps, 90 Mbps, 120 Mbps,
135 Mbps, 150 Mbps, 30 Mbps, 60 Mbps, 90 Mbps, 120 Mbps, 180 Mbps,
240 Mbps, 270 Mbps, 300 Mbps
802.11b/bg/ng/n
operating frequencies
• 2.412–2.462 GHz (US)
• 2.457–2.462 GHz (Spain)
• 2.457–2.472 GHz (France)
• 2.412–2.472 GHz (Europe ETSI)
Table 93.
Wireless VPN firewall IPSec VPN specifications (continued)
Setting
Specification
Page 388 / 414
Default Settings and Technical Specifications
388
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
802.11 b/bg/ng/n
encryption
64-bits and 128-bits WEP, TKIP, CCMP data encryption
Network management
Web-based configuration and status monitoring
Table 95.
Wireless VPN firewall wireless specifications (continued)
Setting
Specification
Page 389 / 414
389
B
B.
Two-Factor Authentication
This appendix provides an overview of two-factor authentication, and an example of how to
implement the WiKID solution. This appendix contains the following sections:
Why Do I Need Two-Factor Authentication?
NETGEAR Two-Factor Authentication Solutions
Why Do I Need Two-Factor Authentication?
In today’s market, online identity theft and online fraud continue to be one of the fast-growing
cybercrime activities used by many unethical hackers and cybercriminals to steal digital
assets for financial gains. Many companies and corporations are losing millions of dollars
and running into risks of revealing their trade secrets and other proprietary information as a
result of these cybercrime activities. Security threats and hackers have become more
sophisticated, and user names, encrypted passwords, and the presence of firewalls are no
longer enough to protect the networks from being compromised. IT professionals and
security experts have recognized the need to go beyond the traditional authentication
process by introducing and requiring additional factors in the authentication process.
NETGEAR has also recognized the need to provide more than just a firewall to protect the
networks. NETGEAR has implemented a more robust authentication system known as
two-factor authentication (2FA or T-FA) to help address the fast-growing network security
issues.
What Are the Benefits of Two-Factor Authentication?
Stronger security
. Passwords cannot efficiently protect the corporate networks because
attackers can easily guess simple passwords or users cannot remember complex and
unique passwords. One-time passcode (OTP) strengthens and replaces the need to
remember complex password.
No need to replace existing hardware
. Two-factor authentication can be added to
existing NETGEAR products through a firmware upgrade.
Quick to deploy and manage
. The WiKID solution integrates seamlessly with the
NETGEAR SSL and VPN firewall products.
Proven regulatory compliance
. Two-factor authentication has been used as a
mandatory authentication process for many corporations and enterprises worldwide.
Page 390 / 414
Two-Factor Authentication
390
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
What Is Two-Factor Authentication?
Two-factor authentication is a security solution that enhances and strengthens security by
implementing multiple factors of the authentication process that challenge and confirm the
users’ identities before they can gain access to the network. There are several factors that
are used to validate the users to make sure that you are who you say you are. These factors
are:
Something you know—for example, your password or your PIN.
Something you have—for example, a token with generated passcode that is 6 to 8 digits
in length.
Something you are—for example, biometrics such as fingerprints or retinal prints.
This appendix focuses on and discusses only the first two factors, something you know and
something you have. This security method can be viewed as a two-tiered authentication
approach because it typically relies on what you know and what you have. A common
example of two-factor authentication is a bank (ATM) card that has been issued by a bank
institute:
The PIN to access your account is
something you know.
The ATM card is
something you have.
You need to have both of these factors to gain access to your bank account. Similar to the
way ATM cards work, access to the corporate networks and data can also be strengthened
using a combination of multiple factors such as a PIN and a token (hardware or software) to
validate the users and reduce the incidence of online identity theft.
NETGEAR Two-Factor Authentication Solutions
NETGEAR has implemented 2 two-factor authentication solutions from WiKID. WiKID is the
software-based token solution. So instead of using only Windows Active Directory or LDAP
as the authentication server, administrators now have the option to use WiKID to perform
two-factor authentication on NETGEAR SSL and VPN firewall products.
The WiKID solution is based on a request-response architecture where a one-time passcode
(OTP), which is time-synchronized with the authentication server, is generated and sent to
the user after the validity of a user credential has been confirmed by the server.
The request-response architecture is capable of self-service initialization by end users,
dramatically reducing implementation and maintenance costs.
Here is an example of how WiKID works:
To use WiKID (for end users):
1.
Launch the WiKID token software, enter the PIN that has been provided (
something the
user know
s), and then click
Continue
to receive the OTP from the WiKID authentication
server:

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top