Page 6 / 224 Scroll up to view Page 1 - 5
December 2003, M-10041-01
ii
Contents
Worksheet for Recording Your Internet Connection Information
..............................
3-3
Connecting the FVS328 to Your LAN
.............................................................................
3-4
How to Connect the FVS328 to Your LAN
...............................................................
3-4
Configuring for a Wizard-Detected Login Account
...................................................
3-7
Configuring for a Wizard-Detected Dynamic IP Account
.........................................
3-8
Configuring for a Wizard-Detected Fixed IP (Static) Account
..................................
3-9
Configuring a Serial Port as the Primary Internet Connection
........................................
3-9
How to Configure the Serial Port for an Internet Connection
...................................
3-9
Testing Your Internet Connection
..................................................................................
3-13
Manually Configuring Your Internet Connection
...........................................................
3-14
How to Manually Configure the Primary Internet Connection
................................
3-15
Chapter 4
Serial Port Configuration
Configuring a Serial Port Modem
...................................................................................
4-2
Basic Requirements for Serial Port Modem Configuration
.......................................
4-2
How to Configure a Serial Port Modem
....................................................................
4-2
Configuring Auto-Rollover
..............................................................................................
4-3
Basic Requirements for Auto-Rollover
.....................................................................
4-3
How to Configure Auto-Rollover
...............................................................................
4-3
Configuring Dial-in on the Serial Port
.............................................................................
4-4
Basic Requirements for Dial-in
.................................................................................
4-5
How to Configure Dial-in
..........................................................................................
4-5
Configuring LAN-to-LAN Settings
...................................................................................
4-6
Basic Requirements for LAN-to-LAN Connections
..................................................
4-6
How to Configure LAN-to-LAN Connections
............................................................
4-6
Chapter 5
WAN and LAN Configuration
Configuring LAN IP Settings
...........................................................................................
5-1
Using the Router as a DHCP Server
........................................................................
5-2
How to Configure LAN TCP/IP Setup Settings
........................................................
5-3
How to Configure Reserved IP Addresses
...............................................................
5-4
Configuring WAN Settings
..............................................................................................
5-4
Connecting Automatically, as Required
...................................................................
5-5
Setting Up a Default DMZ Server
.............................................................................
5-5
How to Assign a Default DMZ Server
......................................................................
5-5
Page 7 / 224
Contents
iii
December 2003, M-10041-01
Responding to Ping on Internet WAN Port
...............................................................
5-6
How to Set the MTU Size
.........................................................................................
5-6
Configuring Dynamic DNS
..............................................................................................
5-6
How to Configure Dynamic DNS
..............................................................................
5-7
Using Static Routes
........................................................................................................
5-7
Static Route Example
...............................................................................................
5-7
How to Configure Static Routes
...............................................................................
5-8
Chapter 6
Protecting Your Network
Protecting Access to Your FVS328 Firewall
...................................................................
6-1
How to Change the Built-In Password
.....................................................................
6-1
How to Change the Administrator Login Timeout
....................................................
6-2
Configuring Basic Firewall Services
...............................................................................
6-2
Blocking Keywords, Sites, and Services
..................................................................
6-3
How to Block Keywords and Sites
...........................................................................
6-3
Using Firewall Rules to Regulate Network Traffic
..........................................................
6-5
Rules Menu Options
.................................................................................................
6-6
Examples of Using Inbound Rules (Port Forwarding)
..............................................
6-7
Considerations for Inbound Rules
.....................................................................
6-9
Outbound Rule (Service Blocking) Example
............................................................
6-9
Understanding the Order of Precedence for Rules
................................................
6-11
Regulating Access to Network Services
.......................................................................
6-12
How to Define Services
..........................................................................................
6-12
Setting Times and Scheduling Firewall Services
..........................................................
6-13
How to Set Your Time Zone
...................................................................................
6-13
How to Schedule Firewall Services
........................................................................
6-15
Chapter 7
Virtual Private Networking
Overview of FVS328 Policy-Based VPN Configuration
..................................................
7-1
Using Policies to Manage VPN Traffic
.....................................................................
7-1
Using Automatic Key Management
..........................................................................
7-2
IKE Policies’ Automatic Key and Authentication Management
................................
7-3
VPN Policy Configuration for Auto Key Negotiation
.................................................
7-6
VPN Policy Configuration for Manual Key Exchange
...............................................
7-9
Using Digital Certificates for IKE Auto-Policy Authentication
.......................................
7-14
Page 8 / 224
December 2003, M-10041-01
iv
Contents
Certificate Revocation List (CRL)
...........................................................................
7-14
Walk-Through of Configuration Scenarios
....................................................................
7-15
VPNC Scenario 1: Gateway-to-Gateway with Preshared Secrets
.........................
7-15
FVS328 Scenario 1: How to Configure the IKE and VPN Policies
.........................
7-17
How to Check VPN Connections
...........................................................................
7-21
FVS328 Scenario 2: Authenticating with RSA Certificates
....................................
7-22
Chapter 8
Managing Your Network
Network Management
....................................................................................................
8-1
How to Configure Remote Management
..................................................................
8-1
Viewing Router Status and Usage Statistics
............................................................
8-3
Viewing Attached Devices
........................................................................................
8-6
Viewing, Selecting, and Saving Logged Information
................................................
8-7
Changing the Include in Log Settings
................................................................
8-9
Enabling the Syslog Feature
.............................................................................
8-9
Enabling Security Event E-mail Notification
.................................................................
8-10
Backing Up, Restoring, or Erasing Your Settings
.........................................................
8-11
How to Back Up the FVS328 Configuration to a File
.............................................
8-11
How to Restore a Configuration from a File
...........................................................
8-12
How to Erase the Configuration
.............................................................................
8-13
Running Diagnostic Utilities and Rebooting the Router
................................................
8-13
Upgrading the Router’s Firmware
.................................................................................
8-14
How to Upgrade the Router
...................................................................................
8-15
Chapter 9
Troubleshooting
Basic Functions
..............................................................................................................
9-1
Power LED Not On
...................................................................................................
9-2
Test LED Never Turns On or Test LED Stays On
.....................................................
9-2
Local or Internet Port Link LEDs Not On
..................................................................
9-3
Troubleshooting the Web Configuration Interface
..........................................................
9-3
Troubleshooting the ISP Connection
..............................................................................
9-4
Troubleshooting a TCP/IP Network Using a Ping Utility
.................................................
9-5
How to Test the LAN Path to Your Firewall
..............................................................
9-6
How to Test the Path from Your PC to a Remote Device
.........................................
9-6
Restoring the Default Configuration and Password
........................................................
9-7
Page 9 / 224
Contents
v
December 2003, M-10041-01
How to Use the Default Reset Button
......................................................................
9-7
Problems with Date and Time
.........................................................................................
9-8
Appendix A
Technical Specifications
Appendix B
Firewall Log Formats
Action List
......................................................................................................................
B-1
Field List
........................................................................................................................
B-1
Outbound Log
................................................................................................................
B-1
Inbound Log
...................................................................................................................
B-2
Other IP Traffic
..............................................................................................................
B-2
Router Operation
...........................................................................................................
B-3
Other Connections and Traffic to this Router
................................................................
B-4
DoS Attack/Scan
...........................................................................................................
B-4
Access Block Site
..........................................................................................................
B-6
All Web Sites and News Groups Visited
........................................................................
B-6
System Admin Sessions
................................................................................................
B-6
Policy Administration LOG
.............................................................................................
B-7
Appendix C
Networks, Routing, and Firewall Basics
Related Publications
......................................................................................................
C-1
Basic Router Concepts
..................................................................................................
C-1
What is a Router?
...................................................................................................
C-1
Routing Information Protocol
...................................................................................
C-2
IP Addresses and the Internet
.................................................................................
C-2
Netmask
..................................................................................................................
C-4
Subnet Addressing
..................................................................................................
C-4
Private IP Addresses
...............................................................................................
C-7
Single IP Address Operation Using NAT
.................................................................
C-7
MAC Addresses and Address Resolution Protocol
.................................................
C-9
Related Documents
.................................................................................................
C-9
Domain Name Server
..............................................................................................
C-9
IP Configuration by DHCP
....................................................................................
C-10
Internet Security and Firewalls
....................................................................................
C-10
What is a Firewall?
................................................................................................
C-11
Page 10 / 224
December 2003, M-10041-01
vi
Contents
Stateful Packet Inspection
.....................................................................................
C-11
Denial of Service Attack
........................................................................................
C-11
Ethernet Cabling
..........................................................................................................
C-12
Uplink Switches and Crossover Cables
................................................................
C-12
Cable Quality
.........................................................................................................
C-13
Appendix D
Preparing Your Network
Preparing Your Computers for TCP/IP Networking
.......................................................
D-1
Configuring Windows 95, 98, and Me for TCP/IP Networking
.......................................
D-2
Install or Verify Windows Networking Components
.................................................
D-2
Enabling DHCP to Automatically Configure TCP/IP Settings
.................................
D-4
Selecting Windows’ Internet Access Method
....................................................
D-4
Verifying TCP/IP Properties
....................................................................................
D-5
Configuring Windows NT, 2000 or XP for IP Networking
...............................................
D-5
Installing or Verifying Windows Networking Components
.......................................
D-5
Verifying TCP/IP Properties
....................................................................................
D-6
Configuring the Macintosh for TCP/IP Networking
........................................................
D-6
MacOS 8.6 or 9.x
....................................................................................................
D-6
MacOS X
.................................................................................................................
D-7
Verifying TCP/IP Properties for Macintosh Computers
...........................................
D-8
Verifying the Readiness of Your Internet Account
.........................................................
D-9
Are Login Protocols Used?
.....................................................................................
D-9
What Is Your Configuration Information?
................................................................
D-9
Obtaining ISP Configuration Information for Windows Computers
.......................
D-10
Obtaining ISP Configuration Information for Macintosh Computers
.....................
D-11
Restarting the Network
................................................................................................
D-12
Appendix E
Virtual Private Networking
What is a VPN?
.............................................................................................................
E-1
What Is IPSec and How Does It Work?
.........................................................................
E-2
IPSec Security Features
.........................................................................................
E-2
IPSec Components
.................................................................................................
E-2
Encapsulating Security Payload (ESP)
...................................................................
E-3
Authentication Header (AH)
....................................................................................
E-4
IKE Security Association
.........................................................................................
E-4

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top