ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
6
|
Table of Contents
Using Rules to Block or Allow Specific Kinds of Traffic . . . . . . . . . . . . . . .43
About Services-Based Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
Viewing the Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Order of Precedence for Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Setting the Default Outbound Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Creating a LAN WAN Outbound Services Rule . . . . . . . . . . . . . . . . . . .49
Creating a LAN WAN Inbound Services Rule. . . . . . . . . . . . . . . . . . . . .49
Modifying Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
Inbound Rules Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Outbound Rules Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
Configuring Other Firewall Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Attack Checks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Configuring Session Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
Managing the Application Level Gateway for SIP Sessions. . . . . . . . . .56
Creating Services, QoS Profiles, and Bandwidth Profiles . . . . . . . . . . . . .57
Adding Customized Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Setting Quality of Service (QoS) Priorities . . . . . . . . . . . . . . . . . . . . . . .58
Creating Bandwidth Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Setting a Schedule to Block or Allow Specific Traffic . . . . . . . . . . . . . . . . .61
Blocking Internet Sites (Content Filtering) . . . . . . . . . . . . . . . . . . . . . . . . .62
Configuring Source MAC Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Configuring IP/MAC Address Binding. . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Configuring Port Triggering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
E-Mail Notifications of Event Logs and Alerts. . . . . . . . . . . . . . . . . . . . . . .68
Administrator Tips. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Chapter 5
Virtual Private Networking Using IPsec
Considerations for Dual WAN Port Systems . . . . . . . . . . . . . . . . . . . . . . .70
Using the VPN Wizard for Client and Gateway Configurations . . . . . . . . .72
Creating Gateway to Gateway VPN Tunnels with the Wizard . . . . . . . .72
Creating a Client to Gateway VPN Tunnel . . . . . . . . . . . . . . . . . . . . . . .75
Testing the Connections and Viewing Status Information . . . . . . . . . . . . .80
NETGEAR VPN Client Status and Log Information . . . . . . . . . . . . . . . .80
VPN Firewall VPN Connection Status and Logs . . . . . . . . . . . . . . . . . .82
Managing VPN Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Configuring IKE Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Configuring VPN Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Configuring Extended Authentication (XAUTH) . . . . . . . . . . . . . . . . . . . . .86
Configuring XAUTH for VPN Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . .86
User Database Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
RADIUS Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
Assigning IP Addresses to Remote Users (ModeConfig). . . . . . . . . . . . . .90
Mode Config Operation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Configuring Mode Config Operation on the VPN Firewall . . . . . . . . . . .91
Configuring the ProSafe VPN Client for ModeConfig . . . . . . . . . . . . . . .94
Configuring Keepalives and Dead Peer Detection . . . . . . . . . . . . . . . . . . .95