Page 6 / 178 Scroll up to view Page 1 - 5
v1.0, September 2006
vi
Product and Publication Details
Model Number:
FVS338
Publication Date:
September 2006
Product Family:
VPN firewall
Product Name:
ProSafe VPN Firewall 50
Home or Business Product:
Business
Language:
English
Publication Part Number:
202-10046-03
Publication Version Number
1.0
Page 7 / 178
vii
v1.0, September 2006
Contents
About This Manual
Conventions, Formats and Scope
...................................................................................
xiii
How to Use This Manual
..................................................................................................
xiv
How to Print this Manual
..................................................................................................
xiv
Revision History
...............................................................................................................
xv
Chapter 1
Introduction
Key Features
..................................................................................................................
1-1
Full Routing on Both the Broadband and Serial WAN Ports
....................................
1-2
A Powerful, True Firewall with Content Filtering
......................................................
1-2
Security
....................................................................................................................
1-2
Autosensing Ethernet Connections with Auto Uplink
...............................................
1-3
Extensive Protocol Support
......................................................................................
1-3
Trend Micro Integration
............................................................................................
1-4
Easy Installation and Management
..........................................................................
1-4
Maintenance and Support
........................................................................................
1-5
Package Contents
..........................................................................................................
1-5
Router Hardware Components
.......................................................................................
1-5
Router Front Panel
...................................................................................................
1-6
Router Rear Panel
...................................................................................................
1-7
Rack Mounting Hardware
.........................................................................................
1-8
Factory Default Login
.....................................................................................................
1-8
Chapter 2
Connecting the FVS338 to the Internet
Connecting the VPN Firewall to Your Network
...............................................................
2-1
Logging in to the VPN Firewall
................................................................................
2-1
Configuring your Internet Connection
......................................................................
2-2
Setting the Router’s MAC Address (Advanced Options)
.........................................
2-7
Page 8 / 178
viii
v1.0, September 2006
Manually Configuring Your Internet Connection
.......................................................
2-9
Programming the Traffic Meter (if Desired)
............................................................
2-12
Configuring the WAN Mode
..........................................................................................
2-15
Configuring Dynamic DNS (If Needed)
.........................................................................
2-16
Chapter 3
LAN Configuration
Configuring Your LAN (Local Area Network)
..................................................................
3-1
Using the VPN Firewall as a DHCP Server
..............................................................
3-1
Configuring Multi-Home LAN IPs
.............................................................................
3-4
Managing Groups and Hosts
..........................................................................................
3-5
Creating the Network Database
...............................................................................
3-5
Setting Up Address Reservation
..............................................................................
3-8
Configuring Static Routes
...............................................................................................
3-8
Static Route Example
...............................................................................................
3-9
RIP Configuration
...................................................................................................
3-10
Enabling Trend Micro Antivirus Enforcement
...............................................................
3-12
Chapter 4
Firewall Protection and Content Filtering
About Firewall Security
...................................................................................................
4-1
Using Rules to Block or Allow Specific Kinds of Traffic
..................................................
4-1
Services-Based Rules
..............................................................................................
4-2
Outbound Rules (Service Blocking)
...................................................................
4-2
Inbound Rules (Port Forwarding)
......................................................................
4-4
Order of Precedence for Firewall Rules
...................................................................
4-6
Setting LAN WAN Rules
.................................................................................................
4-7
LAN WAN Outbound Services Rules
.......................................................................
4-8
LAN WAN Inbound Services Rules
..........................................................................
4-9
Attack Checks
........................................................................................................
4-10
Inbound Rules Examples
.......................................................................................
4-12
Hosting A Local Public Web Server
.................................................................
4-12
Allowing Videoconference from Restricted Addresses
....................................
4-13
Setting Up One-to-One NAT Mapping
.............................................................
4-13
Specifying an Exposed Host
............................................................................
4-15
Outbound Rules Example – Blocking Instant Messenger
......................................
4-16
Adding Customized Services
........................................................................................
4-17
Page 9 / 178
ix
v1.0, September 2006
Specifying Quality of Service (QoS) Priorities
..............................................................
4-19
Setting a Schedule to Block or Allow Traffic
.................................................................
4-20
Setting Block Sites (Content Filtering)
..........................................................................
4-21
Enabling Source MAC Filtering
....................................................................................
4-23
Setting Up Port Triggering
............................................................................................
4-24
E-Mail Notifications of Event Logs and Alerts
...............................................................
4-27
Administrator Information
.............................................................................................
4-31
Chapter 5
Virtual Private Networking
Dual WAN Port Systems
.................................................................................................
5-1
Setting up a VPN Connection using the VPN Wizard
.....................................................
5-2
Creating a VPN Tunnel to a Gateway
......................................................................
5-2
Creating a VPN Tunnel Connection to a VPN Client
...............................................
5-3
IKE Policies
....................................................................................................................
5-4
IKE Policy Operation
................................................................................................
5-4
IKE Policy Table
.......................................................................................................
5-5
VPN Policies
...................................................................................................................
5-5
VPN Policy Operation
..............................................................................................
5-6
VPN Policy Table
......................................................................................................
5-6
VPN Tunnel Connection Status
................................................................................
5-7
Creating a VPN Gateway Connection: Between FVS338 and FVX538
.........................
5-8
Configuring the FVS338
...........................................................................................
5-8
Configuring the FVX538
.........................................................................................
5-11
Testing the Connection
...........................................................................................
5-12
Creating a VPN Client Connection: VPN Client to FVS338
..........................................
5-12
Configuring the FVS338
.........................................................................................
5-13
Configuring the VPN Client
....................................................................................
5-14
Testing the Connection
...........................................................................................
5-19
Extended Authentication (XAUTH) Configuration
.........................................................
5-20
Configuring XAUTH for VPN Clients
......................................................................
5-21
User Database Configuration
.................................................................................
5-22
RADIUS Client Configuration
.................................................................................
5-23
Manually Assigning IP Addresses to Remote Users (ModeConfig)
.............................
5-25
ModeConfig Operation
...........................................................................................
5-26
Setting Up ModeConfig
..........................................................................................
5-26
Page 10 / 178
x
v1.0, September 2006
Configuring the ProSafe VPN Client for ModeConfig
.............................................
5-30
Certificates
....................................................................................................................
5-33
Trusted Certificates (CA Certificates)
.....................................................................
5-33
Self Certificates
......................................................................................................
5-34
Managing your Certificate Revocation List (CRL)
..................................................
5-37
Chapter 6
Router and Network Management
Performance Management
.............................................................................................
6-1
VPN Firewall Features That Reduce Traffic
.............................................................
6-1
Service Blocking
................................................................................................
6-2
Block Sites
.........................................................................................................
6-3
Source MAC Filtering
........................................................................................
6-4
VPN Firewall Features That Increase Traffic
...........................................................
6-4
Port Forwarding
.................................................................................................
6-4
Port Triggering
...................................................................................................
6-6
VPN Tunnels
......................................................................................................
6-6
Using QoS to Shift the Traffic Mix
............................................................................
6-7
Tools for Traffic Management
...................................................................................
6-7
Administration
.................................................................................................................
6-7
Changing Passwords and Settings
..........................................................................
6-7
Enabling Remote Management Access
...................................................................
6-9
Using a SNMP Manager
........................................................................................
6-11
Settings Backup and Firmware Upgrade
...............................................................
6-12
Backup and Restore Settings
..........................................................................
6-13
Router Upgrade
...............................................................................................
6-14
Setting the Time Zone
............................................................................................
6-15
Monitoring the Router
...................................................................................................
6-16
Enabling the Traffic Meter
......................................................................................
6-16
Setting Login Failures and Attacks Notification
......................................................
6-18
Monitoring Attached Devices
.................................................................................
6-20
Viewing Port Triggering Status
...............................................................................
6-21
Viewing Router Configuration and System Status
.................................................
6-22
Monitoring WAN Ports Status
.................................................................................
6-23
Monitoring VPN Tunnel Connection Status
............................................................
6-24
VPN Logs
...............................................................................................................
6-25

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top