Page 171 / 203 Scroll up to view Page 166 - 170
Appendix A:
Default Settings and Technical Specifications
|
171
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
Technical specifications for the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN are
listed in the following table.
Management
Time Zone
GMT
Time Zone Adjusted for Daylight
Saving Time
Disabled
SNMP
Disabled
Remote Management
Disabled
Firewall
Inbound (communications coming in
from the Internet)
Denied
Outbound (communications from the
LAN to the Internet)
Allowed (all)
Source MAC filtering
Disabled
Stealth Mode
Enabled
Table A-2.
VPN firewall Technical Specifications
Feature
Specifications
Network Protocol
and Standards
Compatibility
Data and Routing Protocols:
TCP/IP, RIP-1, RIP-2, DHCP
PPP over Ethernet (PPPoE)
Power Adapter
North America:
120V, 60 Hz, input
United Kingdom, Australia:
240V, 50 Hz, input
Europe:
230V, 50 Hz, input
Japan:
100V, 50/60 Hz, input
Physical
specifications
Dimensions:
1.7 x 13 x 8.2 in.
Weight:
2 kg
(4.5 lb)
Environmental
Specifications
Operating temperature:
0
to 40
C
(32º to 104º F)
Operating humidity:
90% maximum relative humidity, noncondensing
Electromagnetic
Emissions
Meets requirements of:
FCC Part 15 Class B
VCCI Class B
EN 55 022 (CISPR 22), Class B
Interface
Specifications
LAN:
10BASE-T or 100BASE-Tx 1000BASE-T, RJ-45
WAN:
10BASE-T or 100BASE-Tx 1000BASE-T, RJ-45
Table A-1.
VPN firewall Default Configuration Settings (Continued)
Feature
Default Behavior
Page 172 / 203
172
|
Appendix A:
Default Settings and Technical Specifications
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
Table A-3.
SSL VPN Technical Specifications
Parameter
Specification
Network Management
Web-based configuration and status monitoring
Concurrent Users Supported
10 tunnels
Encryption
DES, 3DES, AES, MD5, SHA-1
Authentication
Local User database, RADIUS, LDAP, MS Active Directory
Certificates supported
X.509, CRL
Electromagnetic Compliance
FCC Part 15 Class B, CE, and C-TICK
Environmental Specifications
Operating temperature: 0 to 50° C
Operating humidity: 5-95%, non-condensing
Page 173 / 203
Appendix B:
Network Planning for Dual WAN Ports
|
173
Network Planning for Dual WAN Ports
B
his appendix describes the factors to consider when planning a network using a firewall that has
dual WAN ports.
This appendix contains the following sections:
What You Need to Do Before You Begin
” on this page.
“Overview of the Planning Process”
on page 177.
“Inbound Traffic”
on page 178.
“Virtual Private Networks (VPNs)”
on page 181.
What You Need to Do Before You Begin
The VPN firewall is a powerful and versatile solution for your networking needs. To make the
configuration process easier and to understand all of the choices available to you, you should
consider the following items before you begin:
1.
Plan your network
a.
Determine whether you will use one or both WAN ports. For one WAN port, you may
need a fully qualified domain name either for convenience or to remotely access a
dynamic WAN IP address.
b.
If you intend to use both WAN ports, determine whether you will use them in rollover
mode for increased system reliability or load balancing mode for maximum
bandwidth efficiency. See the topics in this appendix for more information. Your
decision has the following implications:
Fully qualified domain name
-
For rollover mode, you need a fully qualified domain name to implement
features such as exposed hosts and virtual private networks.
-
For load balancing mode, you may still need a fully qualified domain name
either for convenience or to remotely access a dynamic WAN IP address.
Protocol binding
-
For rollover mode, protocol binding does not apply.
Page 174 / 203
174
|
Appendix B:
Network Planning for Dual WAN Ports
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
-
For load balancing mode, decide which protocols should be bound to a
specific WAN port.
-
You can also add your own service protocols to the list.
2.
Set up your accounts
a.
Obtain active Internet services such as cable or DSL broadband accounts and locate
the Internet Service Provider (ISP) configuration information.
In this document, the WAN side of the network is presumed to be provisioned as
shown in , with two ISPs connected to the VPN firewall through separate physical
facilities.
Each WAN port must be configured separately whether you are using a separate
ISP for each WAN port or are having the traffic of both WAN ports routed through
the same ISP.
Figure B-1
If your ISP charges by the volume of data traffic each month, consider enabling a
traffic meter to monitor or limit your traffic.
b.
Contact a Dynamic DNS Service and register fully qualified domain names for one or
both WAN ports.
3.
Plan your network management approach
The VPN firewall can be managed remotely, but this feature must be enabled locally
after each factory default reset.
You are strongly advised to change the default management
password to a strong
password before enabling remote management.
You can choose a variety of WAN options if the factory default settings are not
suitable for your installation. These options include enabling a WAN port to respond to
a ping, and setting MTU size, port speed, and upload bandwidth.
4.
Prepare to physically connect the VPN firewall to your cable or DSL modems and a
computer. Instruction for connecting your VPN firewall are in the
Installation Guide,
FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN
.
Cabling and Computer Hardware Requirements
To use the VPN firewall on your network, each computer must have an installed Ethernet
Network Interface Card (NIC) and an Ethernet cable. If the computer will connect to your
FVS336G
ISP 1
ISP 2
Internet
WAN port 1
WAN port 2
customer premises
physical facility 1
physical facility 2
route diversity
firewall
Page 175 / 203
Appendix B:
Network Planning for Dual WAN Ports
|
175
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
network at 100 Mbps, you must use a Category 5 (CAT5) cable such as the one provided
with your VPN firewall.
Computer Network Configuration Requirements
The VPN firewall includes a built-in Web Configuration Manager. To access the configuration
menus on the VPN firewall, your must use a Java-enabled Web browser program that
supports HTTP uploads such as Microsoft Internet Explorer 6 or higher, Mozilla Firefox 3 or
higher, or Apple Safari 3 or higher with JavaScript, cookies, and you must have SSL enabled.
Free browsers are readily available for Windows, Macintosh, or UNIX/Linux.
For the initial connection to the Internet and configuration of your VPN firewall, you will need
to connect a computer to the VPN firewall that is set to automatically get its TCP/IP
configuration from the VPN firewall via DHCP.
Note:
For help with DHCP configuration, see the link to the online
document
Preparing Your Network
in Appendix D.
The cable or DSL modem broadband access device must provide a standard 10 Mbps
(10BASE-T) Ethernet interface.
Internet Configuration Requirements
Depending on how your ISPs set up your Internet accounts, you will need one or more of
these configuration parameters to connect your VPN firewall to the Internet:
Host and Domain Names
ISP Login Name and Password
ISP Domain Name Server (DNS) Addresses
Fixed IP Address which is also known as Static IP Address
Where Do I Get the Internet Configuration Parameters?
There are several ways you can gather the required Internet connection information.
Your ISP has the information needed to connect to the Internet. If you cannot locate this
information, ask your ISP to provide it or try one of the following options.
If you have a computer already connected using the active Internet access account, you
can gather the configuration information from that computer.
-
For Windows 95/98/ME, open the Network control panel, select the TCP/IP entry for
the Ethernet adapter, and click Properties. Record all the settings for each screen.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top