NETGEAR FVS338 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198

Ir para a página of

Bom manual de uso

As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto NETGEAR FVS338. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoNETGEAR FVS338 vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.

O que é a instrução?

A palavra vem do latim "Instructio" ou instruir. Portanto, no manual NETGEAR FVS338 você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.

Infelizmente, pequenos usuários tomam o tempo para ler o manual NETGEAR FVS338, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.

Então, o que deve conter o manual perfeito?

Primeiro, o manual NETGEAR FVS338 deve conte:
- dados técnicos do dispositivo NETGEAR FVS338
- nome do fabricante e ano de fabricação do dispositivo NETGEAR FVS338
- instruções de utilização, regulação e manutenção do dispositivo NETGEAR FVS338
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes

Por que você não ler manuais?

Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque NETGEAR FVS338 não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos NETGEAR FVS338 e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço NETGEAR na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas NETGEAR FVS338, como para a versão papel.

Por que ler manuais?

Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo NETGEAR FVS338, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.

Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual NETGEAR FVS338. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação

Índice do manual

  • Página 1

    March 2008 202-10046-06 v1.0 NETGEAR , Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA FVS338 ProSafe VPN Firewall 50 Reference Manual[...]

  • Página 2

    ii v1.0, March 2008 © 2007 by NETGEAR, Inc. All rights reserved. T rademarks NETGEAR, the NETGEAR logo a nd ProSafe are trademarks and/or regist ered trademarks of NETGEAR, Inc. Microsoft, W indows, and W indow s NT are registered trademar ks of Microsoft Corporation. Other brand and product names are registered tradem arks or trademarks o f their[...]

  • Página 3

    v1.0, March 2008 iii Federal Of fice for T elecommuni cations Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for complianc e with the regulations. V olunt ary Control Council for Interfe rence (VCCI) St atement This equipment is in the second category (information equipme[...]

  • Página 4

    v1.0, March 20 08 iv Open SSL Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitte d provided that the follo wing conditions * are me t: 1. Redistributions of source code must retain the above copyrigh t notice, this list of co nditions and t[...]

  • Página 5

    v1.0, March 2008 v MD5 Copyright (C) 1990, RSA Data Se curity , Inc. All rights reserved. License to copy and u se this software is granted provided that it is id entified as the "RSA Data Security , Inc. MD5 Message-Digest Algori thm" in all material mentioning or referencing this software or this function. License is also gr anted to ma[...]

  • Página 6

    v1.0, March 20 08 vi Product and Publication Det ails Model Number: FVS338 Publication Date: March 2008 Product Family: VPN firewall Product Name: ProSafe VPN Firewall 50 Home or Business Prod uc t: Business Language: Engl ish Publication Part Number: 202-10046-06 Publication V ersion Number 1.0[...]

  • Página 7

    Contents vii v1.0, March 2008 Content s About This Manual Conventions, Formats and Scope ................ ................ ............. ................ ............. ......... xiii How to Use This Manual ........................ ................ ............. ................ ............. ................ xiv How to Print this Manual ...........[...]

  • Página 8

    viii Contents v1.0, March 2008 Configuring the WAN Mode ... ................ .......... ... ............. ............. ................ ............. ... 2-15 Configuring Dynamic DNS (If N eeded) ..... ................ ................. ............. ................ ...... 2-16 Chapter 3 LAN Configuration Configuring Y our LAN (Local Area Network[...]

  • Página 9

    Contents ix v1.0, March 2008 Setting Block Sites (C ontent F iltering) ...... ................ ............. ................. ............ .......... 4-22 Enabling Source MAC Filtering .......................... ............. ............. ............. ................ ... 4-24 IP/MAC Binding .. ............ ............. ................. ......[...]

  • Página 10

    x Contents v1.0, March 2008 Configuring the ProSafe VPN Client for Mode Config ................... ....... ...... ....... ...... 5-30 Certificates ............. ................ ................ ................ ................ ................. ................ .... .. 5-33 T r usted Certificates (CA Certificates) ........ ................ ......[...]

  • Página 11

    Contents xi v1.0, March 2008 Performing Diagnostics ................ ............. ............. ............. ............. ............ .......... 6-26 Chapter 7 T roubleshooting Basic Functions .................. ............. ................ ............. ............. ................ ............. ........ 7 -1 Power LED Not On .............[...]

  • Página 12

    xii Contents v1.0, March 2008 Routing Logs ...... ............ ............. ................. ............ ................. ............. ............ ......... B-1 4 LAN to W AN Logs .... ............. ................. ............ ............. ................. ............ ......... B-15 LAN to DMZ Logs ............... ............. ........[...]

  • Página 13

    xiii v1.0, March 2008 About This Manual The NETGEAR ® ProSafe™ VPN Fir ewall 50 FVS338 Refer ence Manual describes how to install, configure and trou bleshoot the ProSafe VPN Fire wall 50. The information i n this manual is intended for readers with intermedia te computer and Internet skills. Conventions, Format s and Scope The conventions, form[...]

  • Página 14

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual xiv About This Manual v1.0, March 2008 • Scope. This manual is written for the VPN fir ewall according to these specifications: For more information about networ k, Internet, firewall, and VPN technologies, see the links to the NETGEAR website in Appendix C, “Related Documents” . How to Use Th[...]

  • Página 15

    FVS338 ProSafe VPN Firewall 50 Reference Manual About This Manual xv v1.0, March 2008 • Printing from PDF . Y our computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe W eb site at http://www .adobe.c om . – Printing a PDF Chapter . Use the PDF of This Chapt[...]

  • Página 16

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual xvi About This Manual v1.0, March 2008[...]

  • Página 17

    Introduction 1-1 v1.0, March 2008 Chapter 1 Introduction The ProSafe VPN Firewall 50 with 8 port switch c onnects your local area network (LAN) to the Internet through an extern al access device such as a cable modem or DSL modem. The FVS338 is a complete security solution that protects your network from attacks and intrusions. For example, the FVX[...]

  • Página 18

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-2 Introduction v1.0, March 2008 • Flash memory for firmware upgrade. Full Routing on Both the Br oadband and Serial W AN Port s Y ou can install, configure, and op erate the FVS338 to take full advantage of a variety of routing options on both the serial and b roadband W A N ports, including: ?[...]

  • Página 19

    FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-3 v1.0, March 2008 • Port Forwarding with NA T . Although NA T prevents Intern et locations from directly accessing the PCs on the LAN, the firewall allows you to direct incomi ng traffic to specific PCs based on the service port number of the incoming request. Y ou can specify forwar[...]

  • Página 20

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-4 Introduction v1.0, March 2008 Easy Inst allation and Management Y ou can install, configure, and operate the ProSafe VPN Firewall 50 within minutes after connecting it to the network. Th e following featur es simplify in stallation and management tasks: • Browser -based management . Browser-ba[...]

  • Página 21

    FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-5 v1.0, March 2008 • ProSafe VPN Firewall 50. •A C p o w e r a d a p t e r . • Category 5 Ethernet cabl e. • Resour ce CD , including: – Application Notes and ot her helpful information. – ProSafe VPN Client Softwa re – one user license. • W arranty and Support Informati[...]

  • Página 22

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-6 Introduction v1.0, March 2008 Router Rear Panel The rear panel of the ProSafe VPN Firewall 50 ( Figure 1-2 ) contains the On/Off switch and AC power connection. T able 1-1. Object Descriptions Object Activity Description Power LED On (Green) Off Power is supplied to the router . Power is not sup[...]

  • Página 23

    FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-7 v1.0, March 2008 V iewed from left to right, the rear panel contains the following elements: • Modem port – serves as the W AN2 Internet port through the public switched telephone network (PSTN). • Factory Defaults reset button. • Local ports – 8-port RJ-4 5 10/100 Mbps Fast[...]

  • Página 24

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-8 Introduction v1.0, March 2008 T o log in to the FVS3 38 once it is connected: 1. Open a W eb browser . 2. Enter http://192.168.1.1 as the URL. 3. Once the login screen displays ( Figure 1-5 ), enter the following: • admin for User Name • password for Password Figure 1-4 Figure 1-5 LAN IP Add[...]

  • Página 25

    2-1 v1.0, March 2008 Chapter 2 Connecting the FVS338 to the Internet This section provides instructio ns for connecting the VPN firewa ll. Setting up VPN tunnels are covered in Chapter 5, “V irtual Private Networking” : 1. Connect the fir ewall physi cally to your network . Connect the cables, tu rn on your ro uter and wait for the T est LED to[...]

  • Página 26

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-2 Connecting the FVS338 to the Intern et v1.0, March 2008 T o log in to the VPN firewall: St e p 1 . Open a Internet Explorer, Netscape® Naviga tor , or Firefox browse r . In the browser window , enter http://192.168.1.1 in the address field. The FVS 338 login screen will display . 2. Enter admin[...]

  • Página 27

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-3 v1.0, March 2008 2. Click Auto Detect at the bottom of the screen to automatic ally detect the type of Internet connection provided by your IS P . Auto Detect will probe for different connection methods and suggest one that your ISP will most likely su pp or[...]

  • Página 28

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-4 Connecting the FVS338 to the Intern et v1.0, March 2008 3. Click Broadband S t a tus at the to p right of the screen to verify you r Broa dband connection status. Click Conne ct if connection not already present. If Auto Detect does not find a connection, you will be prompted to check the physic[...]

  • Página 29

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-5 v1.0, March 2008 St e p 1 . Select Network Configuration from the main menu, W AN Settings from the submenu and click the Dialup ISP Settings tab to display the Dialup settings screen. 2. Enter the following Dialup Account settings: a. Account/User name : En[...]

  • Página 30

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-6 Connecting the FVS338 to the Intern et v1.0, March 2008 3. Specify the method to use for your Dial-up Connection S tatus. The VPN firewall can automatically dial to the ISP wh en a connection is needed or can be configured to wait for manual intervention.: a. Check the Connect automatically disc[...]

  • Página 31

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-7 v1.0, March 2008 Set up the traffic meter for the Dialup ISP if desired (see “Programming the T raffic Meter (if Desired)” on page 2-12 ). Setting the Router ’ s MAC Address (Advanced Options) Each computer or router on your network has a unique 48-bit[...]

  • Página 32

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-8 Connecting the FVS338 to the Intern et v1.0, March 2008 This could occur on some older broadband modems. If you k now that the Ethernet port on your broadband mo dem supports 100Bas eT , select 100BaseT ; oth erwise, select 10BaseT . Use the half-duplex settings if full-duplex modes do not work.[...]

  • Página 33

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-9 v1.0, March 2008 . Manually Configuring Y o ur Internet Connection If you know your Broadband ISP connection type, you can bypass the Auto Detect feature and connect your router manually . Ensure that you h ave all of the relevant c onnection information suc[...]

  • Página 34

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-10 Connecting the FVS338 to the Intern et v1.0, March 2008 T o manually configure your W AN1 ISP setting s: St e p 1 . Does your Internet connection require a login ? If you need to ente r login information every time you connect to the Internet through your ISP , select Y es. Otherwise, select No[...]

  • Página 35

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-11 v1.0, March 2008 – Domain Name : Y our domain name or workgroup name assigned by your ISP , or your ISPs domain name. Y ou may leave this field blank. – Idle Timeout : Check the Keep Connected radio bo x to keep the connection always on. T o logout a[...]

  • Página 36

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-12 Connecting the FVS338 to the Intern et v1.0, March 2008 4. If your ISP has not assigned any Domain Name Servers (DNS) addresses, select the Get dynamically from ISP radio box. If your ISP has a ssigned DNS addresses, select the Use these DNS Servers radio box. Ensure that you fill in valid DNS [...]

  • Página 37

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-13 v1.0, March 2008 Figure 2-8[...]

  • Página 38

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-14 Connecting the FVS338 to the Intern et v1.0, March 2008 T able 2-2. T raffic Meter Settings Parameter Description Enable T raffic Meter Check this if you wish to record the volume of Internet traffic passing through the Router's Broadband or Dial up po rt. Broadband or Dialup can be select[...]

  • Página 39

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-15 v1.0, March 2008 Configuring the W AN Mode The WA N M o d e screen allows you to configure how your router uses your external Internet connections; for example, your W AN port or dialup modem co nnections. • NA T . NA T is the technology which allows a[...]

  • Página 40

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-16 Connecting the FVS338 to the Intern et v1.0, March 2008 • If you have both ISP lin ks co nnected for Internet connectivity , check the Primary Broadband with Dialup as backup for auto-rollover . 4. The W AN Failure Detection Method must be config ured to notify the router of a link failure if[...]

  • Página 41

    FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-17 v1.0, March 2008 This router firmware includes software that not ifies dynamic DNS servers of changes in the W AN IP address, so that the services running on this network can be acce ssed by others on the Internet. After you have configured y our account[...]

  • Página 42

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-18 Connecting the FVS338 to the Intern et v1.0, March 2008 If you have configured Single Po rt, select the tab for a DNS serv ice provider , then fill out the DDNS section for that port. If you have enabled Auto-Rollover , choose a service provider and complete both sections. (Only those options t[...]

  • Página 43

    LAN Configuration 3-1 v1.0, March 2008 Chapter 3 LAN Configuration This chapter describes how to configure LAN Setu p, LAN Groups and Routin g (Static IP) features of your ProSafe VPN Firewall 50. These features can be found under the Network Configuration menu of the router interface. Configuring Y our LAN (Local Area Network) By default, the fire[...]

  • Página 44

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-2 LAN Configuration v1.0, March 2008 T o modify your LAN setup: 1. Select Network Configuration from the main menu and LAN Setup from the submenu. The LAN Setup screen will display . 2. Enter the IP Addr ess of your router (factory default: 192.168 .1.1 ). The IP address provided is the router&apo[...]

  • Página 45

    FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-3 v1.0, March 2008 3. Enter the IP Subnet Mask . The subnet mask specifies the ne twork number portion of an IP address. Y our router will automatically calculate the subnet mask based on the IP address that you assign. Unless you are impl ementing subnetting, use 255.25 5.255.0 as[...]

  • Página 46

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-4 LAN Configuration v1.0, March 2008 The feature is particularly useful in Auto Rollover mode. For example, if the DNS se rvers for each connection are different, then a link failure may rend er the DNS servers inaccessible. However , when the DNS proxy is enabled, then clients can make requests t[...]

  • Página 47

    FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-5 v1.0, March 2008 The A vailable Secondary LAN IPs ta ble lists the secondary LAN IP addresses added to the router . • IP Address : The IP address alias added to the LAN port of the router . This is the gateway for computers that need to access the Internet. • Subnet Mask : IP[...]

  • Página 48

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-6 LAN Configuration v1.0, March 2008 Managing Group s and Hosts The Known PCs and Devices table on th e Groups and Hosts screen contains a list of all known PCs and network devices, as well as hosts, that ar e assigned dynamic IP addresses by this router . Collectively , these entries make up the [...]

  • Página 49

    FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-7 v1.0, March 2008 • MAC-level Control over PCs. The Network Da tabase uses the MAC address to identify each PC or device. So changing a PC 's IP address does not affect any restrictions on that PC. • Group and Individual Control over PCs – Y ou can assign PCs to Groups [...]

  • Página 50

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-8 LAN Configuration v1.0, March 2008 The Network Database is created by: • Using the DHCP Server : The rout er ’ s DHCP server is configured, by default, to respond to DHCP requests from clients on the LAN. Every computer that receives a response from the router will be added to the Network Da[...]

  • Página 51

    FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-9 v1.0, March 2008 • Name : The name of the computer or device. Co mputers that do not support the NetBIOS protocol will be listed as Unknown. In this case , the name can be edit ed manually for easier management. If the computer was assigned an IP address by the DHCP server, the[...]

  • Página 52

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-10 LAN Configuration v1.0, March 2008 Setting Up Address Reservation When you specify a reserved IP address for a de vice on the LAN (based on the MAC address of the device), that computer or device will always receive the same IP address each time it accesses the firewall’ s DHCP server . Reser[...]

  • Página 53

    FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-11 v1.0, March 2008 5. Ty p e t h e Destination IP Address or network of the route’ s final destination. 6. Enter the IP Subnet Mask for this destinat ion. If the des tination is a single host, enter 255.255.255.2 55. 7. From the Interface pull-down menu, selection the phys ical [...]

  • Página 54

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-12 LAN Configuration v1.0, March 2008 • Y ou have an ISDN firewall on your home network for con necting to the company where you are employed. This firewall’ s address on your LAN is 192.168.1 .100. • Y our com pany’ s network is 13 4.177.0.0. When you first con figured your firewall, t wo[...]

  • Página 55

    FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-13 v1.0, March 2008 T o enable RIP: 1. Select Network Configuration from the main menu and Routing from the submenu. The Routing screen will display . 2. Click the RIP Configuration link. The RIP Configuration screen will display . 3. From the RIP Direction pull-down menu, select t[...]

  • Página 56

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-14 LAN Configuration v1.0, March 2008 • None – the router neither broadcasts its rout e table nor does it accept any RIP packets from other routers. This effectively disables RIP . 4. Select the RIP V ersion from the pull-down menu: • RIP-1 – classful routing and does not include subnet in[...]

  • Página 57

    Firewall Protection and Conten t Filtering 4-1 v1.0, March 2008 Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with W e b content filtering options such as Block Sites and Keyword Blocking. Parents and network administ rators can establish re stricted access policies based on time-of-day , W eb addr ess[...]

  • Página 58

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-2 Firewall Protection and Content Filtering v1.0, March 2008 • Outbound : Allow all access from the LAN side to the outside. Services-Based Rules The rules to block traffic are based on the traffic’ s category of service. • Inbound Rules (port forwarding ). Inbound traffic is normally blocke[...]

  • Página 59

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 3 v1.0, March 2008 T able 4-1. Outbound Rules Fields Item Description Services Select the desired Service or appli c ati on to be covered by this rule. If the desired service or application does not appear in the list, you must define it using the Services [...]

  • Página 60

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-4 Firewall Protection and Content Filtering v1.0, March 2008 Inbound Rules (Port Forwarding) Because the FVS338 uses N etwork Address T ransla tion (NA T), your network presents only one IP address to the Internet and outside users cannot directly address any of your local computers. However , by [...]

  • Página 61

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 5 v1.0, March 2008 T able 4-2. Inbound Rules Fields Item Description Services Select the desired Service or appli c ati on to be covered by this rule. If the desired service or application does not appear in the list, you must define it using the Services m[...]

  • Página 62

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-6 Firewall Protection and Content Filtering v1.0, March 2008 Remember that allowing inbound services opens holes in your VPN firewall. Only enable those ports that are necessary fo r your network. It is also advisable to turn on the server application security and invoke the user password or privi[...]

  • Página 63

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 7 v1.0, March 2008 Setting LAN W AN Rules The Default Outbound Policy is to allow all traf fic from and to the Inte rnet to pass through. Firewall rules can then be applie d to block specific types of traf fic from either go ing out from the LAN to the Inte[...]

  • Página 64

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-8 Firewall Protection and Content Filtering v1.0, March 2008 1. In the Action column adjacent to the rule click: • Edit – to make any ch anges to the rule definition of an existing rule. The Outbound Service screen will display containing the data for the selected rule (see Figure 4-3 on page [...]

  • Página 65

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 9 v1.0, March 2008 . LAN W AN Inbound Services Rules This Inbound Services Rules tabl e lists all existing rules for in bound traf fic. If you have not defined any rules, no rules will be listed. By default, all inbound traffic is blocked. W AN Users : Whet[...]

  • Página 66

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-10 Firewall Protection and Content Filtering v1.0, March 2008 Att ack Checks This screen allows you to specify whether or no t the router should be protected against common attacks in the LAN and W AN networks. The vari ous types of attack checks are listed on the Attack Checks screen and defined [...]

  • Página 67

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -11 v1.0, March 2008 • LAN Security Ch ecks. A UDP flood is a form of denial of service attack that can be initiated when one machine sends a large nu mber of UDP packets to random ports on a remote host. As a result, the distant host will (1) check for th[...]

  • Página 68

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-12 Firewall Protection and Content Filtering v1.0, March 2008 . Session Limit Session Limit allows you to spec ify the total number of sessions per user over an IP (Internet Protocol) connection allowed across the router . This feature can be enable d on the Session Limit screen and is shown below[...]

  • Página 69

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -13 v1.0, March 2008 T o enable Session Limit : 1. Click the Y es radio button under Do you want to enable Session Limit ? 2. From the User Limit Paramete r drop-down list, define the maximum number of sessions per IP either as a perc entage of maximu m sess[...]

  • Página 70

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-14 Firewall Protection and Content Filtering v1.0, March 2008 Allowing Vi deoconference from Restricted Addresses If you want to allow incoming vi deoconferencing to be initiated from a restricted range of outside IP addresses, such as from a branch office, you can create an inbound rule. In the e[...]

  • Página 71

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -15 v1.0, March 2008 Setting Up One-to-One NA T Mapping In this example, we will configure multi-NA T to support multiple public IP addresses on one W AN interface. By creating an inbound rule, we will configure the firewa ll to host an additional public IP [...]

  • Página 72

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-16 Firewall Protection and Content Filtering v1.0, March 2008 6. From the Public Destination IP Address pull down menu, choose Other Public IP Address. 7. Enter one of your public Internet addresses that will be used by c lients on the Internet to reach your W eb server . 8. Click Apply . The rule[...]

  • Página 73

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -17 v1.0, March 2008 T o test the connection from a PC on the Internet, type http:// <IP_address> , where <IP_address> is the public IP address you have mapped to your W eb server . Y ou should see the home page of your W eb server . Spec ifying [...]

  • Página 74

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-18 Firewall Protection and Content Filtering v1.0, March 2008 Outbound Rules Example – Bl ocking Inst ant Messenger Outbound rules let you prev ent users from using applications such as AOL Instant Messenger , Real Audio or othe r non-essential sites. If you want to block AOL Instant Messenger u[...]

  • Página 75

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -19 v1.0, March 2008 Although the FVS338 already holds a list of many service port numbers, you are not limited to these choices. Use the Services menu to add additional services and applications to the list for use in defining firewall rules. The Services m[...]

  • Página 76

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-20 Firewall Protection and Content Filtering v1.0, March 2008 T o add a service: 1. Select Security from the main menu and Services from the submenu. The Services screen will display . 2. In the Add Custom Service table, enter a descriptive name for the service (this is for your convenience). 3. S[...]

  • Página 77

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -21 v1.0, March 2008 • Normal-Service: No special priority given to the traf fi c. The IP packets for servic es with this priority are marked with a T oS value of 0. • Minimize-Cost: Used when data has to be trans ferred over a link that has a lower “c[...]

  • Página 78

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-22 Firewall Protection and Content Filtering v1.0, March 2008 Repeat these 5 steps to set to a schedule for Schedule 2 and Schedule 3 . Setting Block Sites (Content Filtering) If you want restrict internal LAN users from access to certain sites on the Internet, you can use the VPN firewall’ s Co[...]

  • Página 79

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -23 v1.0, March 2008 Y ou can bypass Keywor d blo cking for truste d domains by add i ng the exact m atching domain to the list of T rusted Domains. Access to the domains or keywor ds on this list by PCs, even those in the groups for which keyword blocking h[...]

  • Página 80

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-24 Firewall Protection and Content Filtering v1.0, March 2008 Enabling Source MAC Filtering Source MAC Filter allows you to filter out tr af fic coming from certain known machines or devices. • By default, the source MAC address filter is disabled. All the traf fic received from PCs with any MAC[...]

  • Página 81

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -25 v1.0, March 2008 • When enabled, traffic will be dropped coming from any comp uters or devices whose MAC addresses are listed in A v ailable MAC Addresses to be Blocke d table. T o enable MAC filtering and add MAC addresses to be blocked: 1. Select Sec[...]

  • Página 82

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-26 Firewall Protection and Content Filtering v1.0, March 2008 6. When you have completed ad ding MAC addresses, click Apply to save your settings. IP/MAC Binding IP/MAC Bindi ng allows you to bind an IP to a MAC address and vice-versa. Some machines are configured with static addresses. T o preven[...]

  • Página 83

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -27 v1.0, March 2008 The IP/MAC Binding T able lists the cu rrently defined IP/MAC Bind rules: • Name : Displays the user-defi ned name for this rule. • MAC Addresses : Displays the MAC Addresses for this rule. • IP Addresses : Displays the IP Addresse[...]

  • Página 84

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-28 Firewall Protection and Content Filtering v1.0, March 2008 4. T o remove an entry from the table, sel ect the IP/MAC Bind entry and click Delete . 5. Click Apply to save your settings. Setting Up Port T riggering Port triggering allows some applications running on a LAN networ k to be available[...]

  • Página 85

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -29 v1.0, March 2008 2. From the Enable pull-down menu, indicate if th e rule is enabled or disabled. 3. From the Protocol pull-down menu, select either TCP or UDP protocol. 4. In the Outgoing (T rigger) Port Range fields; a. Enter the St a r t P o r t range[...]

  • Página 86

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-30 Firewall Protection and Content Filtering v1.0, March 2008 b. Enter the End Port range (1 - 65534). 6. Click Add. The Port T riggering Rule will be added to the Port T riggering Rules table. T o edit or modify a rule: 1. Click Ed it in the Action column opposite th e rule you wish to edit. The [...]

  • Página 87

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -31 v1.0, March 2008 • Bandwidth limiting for outbound traf fic is done on the available W AN interface in both the single port and Auto Rollover modes. Bandwidth limiting is ha ndl ed on the user-specified interface in Load Balancing mode. • Bandwidth l[...]

  • Página 88

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-32 Firewall Protection and Content Filtering v1.0, March 2008 • WA N : Displays the W AN interface fo r the Load Balancing mode. 2. Click Add to add a new Band width Profile. When the Add New Bandwidth Profile screen displays, enter the following: a. Name : Specify an easily identifiable name fo[...]

  • Página 89

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -33 v1.0, March 2008 other general information based on the settings you input on the Firewall Logs & E-mail screen. In addition, if you have set up Cont ent Filtering on the Block Sites screen (see “Setting Block Sites (Content Filtering)” on page 4[...]

  • Página 90

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-34 Firewall Protection and Content Filtering v1.0, March 2008 T o set up Firewall Logs and E-mail alerts: 1. Select Monitoring from the main me nu and then Fir ewall Logs & E-mail from the submenu. The Fir ewall Logs & E-mail screen will display . 2. Enter the name of the log in the Log Id[...]

  • Página 91

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -35 v1.0, March 2008 • LOG_W ARNING (W arning conditions) • LOG_NOTICE (Normal but significant conditions) • LOG_INFO (Informational messages) • LOG_DEBUG (Debug level messages) 10. Click Reset to cancel your changes and re turn to the previous setti[...]

  • Página 92

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-36 Firewall Protection and Content Filtering v1.0, March 2008 Administrator Information Consider the following operational items: 1. As an option, you can en able remote manageme nt if you have to manage distant sites from a central location (see “Enabling Remote Management Access” on page 6-9[...]

  • Página 93

    FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -37 v1.0, March 2008[...]

  • Página 94

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-38 Firewall Protection and Content Filtering v1.0, March 2008[...]

  • Página 95

    Virtual Private Networking 5-1 v1.0, March 2008 Chapter 5 V irtual Private Networking This chapter describes how to u se the V irtua l Private Networking (VPN) features of the VPN firewall. VPN tunnels provide secure, encrypted communications between your local network an d a remote network or computer . Dual W AN Port Systems The dual W AN ports i[...]

  • Página 96

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-2 Virtual Private Networking v1.0, March 2008 Setting up a VPN Connect ion using the VPN Wizard Setting up a VPN tunnel connection requires that al l settings and parameters on both sides of the VPN tunnel match or mirror each other pre cisely , whic h can be a daunting tas k. The VPN W izard can [...]

  • Página 97

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-3 v1.0, March 2008 The Local W AN IP address is the address used in the IKE negotiation phase. Automatically , the W AN IP address assigned by your ISP may display . Y ou can modify the address to use your FQDN; required if the W AN Mode you selected is auto-rollover . 7. [...]

  • Página 98

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-4 Virtual Private Networking v1.0, March 2008 IKE Policies The IKE (Internet Key Exchange) protocol performs negotiations between the two VPN Gateways, and provides automatic ma nagement of the Keys used in IPSec. It is important to remember that: • “Auto” generated VPN policies must use the[...]

  • Página 99

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-5 v1.0, March 2008 • Name . Uniquely identifies each IKE policy . The name is chosen by you and used for the purpose of managing your policies; it is not su pplied to the remote VPN Server . If the Policy is a Client Policy , it will be prepended by an “*”. • Mode [...]

  • Página 100

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-6 Virtual Private Networking v1.0, March 2008 In addition, a CA (Certificate Authority) can also be used to perform authentication (see “Certificates” on page 5- 33 ). T o use a CA, each VPN Gatewa y must have a Certificate from the CA. For each Certificate, there is both a “Public Key” an[...]

  • Página 101

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-7 v1.0, March 2008 – Reconnect after failur e count : Fresh negotiation starts wh en no acknowledgement is received for the specified number of consecutive packets. • Local . IP address (either a single address, range of address or subnet ad dre ss) on your local LAN. [...]

  • Página 102

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-8 Virtual Private Networking v1.0, March 2008 Creating a VPN Gateway Conn ection: Between FVS338 and FVX538 This section describes how to configure a VP N connection between a NETGEAR FVS338 VPN Firewall and a NETGEAR FVX538 VPN Firewall. Using each firewall's VPN W izard, we will create a se[...]

  • Página 103

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-9 v1.0, March 2008 The IKE Policies screen will display showin g the new “to_fvx” policy . Y ou can view the IKE para meters by clicking Edit in the Action column adjacent to the “to- fvs” policy . It should not be necessary to make any changes. Figure 5-1 Figure 5[...]

  • Página 104

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-10 Virtual Private Ne tworking v1.0, March 2008 Click the IKE Policies tab to view the corresp onding IKE Policy . The IKE Policies screen will display . Y ou can view the VPN parameters by clicking Edit in the Actions column adjacent to “to_fvx”. It should no t be n ecessary to make any chang[...]

  • Página 105

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-11 v1.0, March 2008 Configuring the FVX538 T o configure the FVX538 using the VPN W izard: 1. Select VPN from the main menu. The Policies screen will display . Click the VPN Wizard link. The VPN Wizard screen will display . 2. Check the Gateway radio box to establish a re[...]

  • Página 106

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-12 Virtual Private Ne tworking v1.0, March 2008 6. Enter the remote LAN IP address and subnet mask. 7. Click Apply to create the “to_fvs” IKE and VPN policies. T e sting the Connectio n 1. From a PC on either firewa ll’ s LAN, try to ping a PC on the other firewall’ s LAN. Establishing the[...]

  • Página 107

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-13 v1.0, March 2008 Using the FVS338 VPN W izard, we will create a si ngle set of policies (IKE and VPN) that will allow up to 50 remote PCs to connect from locatio ns in which their IP addresses are un known in advance. The PCs may be directly connected to the Internet o[...]

  • Página 108

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-14 Virtual Private Ne tworking v1.0, March 2008 Configuring the VPN Client On a remote PC that has a NETGEAR ProSafe VPN C lient installed, configure the client using the FVS338 VPN Client default parameters (display ed in both the IKE Policy table and the VPN Policy table of the FVS338 under the [...]

  • Página 109

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-15 v1.0, March 2008 T o configure the VPN Client: 1. Right-click on the VPN client icon in your W indows toolbar and select the Security Pol icy Editor . The Security Policy Editor screen will display . 2. In the upper left of the Polic y Editor window , click the New Doc[...]

  • Página 110

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-16 Virtual Private Ne tworking v1.0, March 2008 8. In the left frame, click on My Identity (shown in Figure 5-1 0 ). 9. From the Select Certificate pull-down menu, select None . 10. From the ID T ype pull-down menu, select Domain Name and enter fvs_remote.com in the field provided. 11 . Leave V ir[...]

  • Página 111

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-17 v1.0, March 2008 12. Before leaving the My Identity menu, click Pr e-Shared Key . 13. Click Enter Key , and type your preshared key . Click OK . This key will be shared by all users of the FVS338 policy “home”. Figure 5-10 Figure 5-1 1 10.0.0.12 fvs_remote.com 10.0[...]

  • Página 112

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-18 Virtual Private Ne tworking v1.0, March 2008 14. In the left frame, click Security Policy (shown in Figure 5-12 ). 15. Select Phase 1 Negotiation Mo de by checking the Aggressive Mode radio box. 16. PFS Key Group should be disabled, and Enable Replay Detection should be enabled. 17. In the left[...]

  • Página 113

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-19 v1.0, March 2008 18. In the left frame, expand Key Exchange (Phase 2) and select Proposal 1 . Compare with the figure below . No changes should be neces sary . 19. In the upper left of the window , click the disk icon to save t he policy . T e sting the Connectio n T o[...]

  • Página 114

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-20 Virtual Private Ne tworking v1.0, March 2008 Extended Authentication (XAUTH) Configuration When connecting many VPN clients to a VPN gateway router , an administrator may want a unique user authentication method beyond relying on a single common preshared key for all clien ts. Although the admi[...]

  • Página 115

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-21 v1.0, March 2008 . Configuring XAUTH for VPN Client s Once the XAUTH has been enabled, you must establish user ac count s on the Local Database to be authenticated against XAUTH, or you must en able a RADIUS-CHAP or RADIUS-P AP server . T o enable and configure XAUTH: [...]

  • Página 116

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-22 Virtual Private Ne tworking v1.0, March 2008 • IPSec Host if you want to be authenticated by the remote gateway . In the adjacent Username and Password fields, type in the information user name and password associated with the IKE policy for authenticating this gateway (by the remote gateway)[...]

  • Página 117

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-23 v1.0, March 2008 3. Enter a Password for the user , and reenter the password in the Confirm Password field. 4. Click Add. The User Name will be added to the Configured Hosts table. T o edit the user name or password: 1. Click Edit opposite the user ’ s name. The Edit[...]

  • Página 118

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-24 Virtual Private Ne tworking v1.0, March 2008 information such as a username/password or some encrypted response using his username/ password information. The gateway will try and verify this information first against a local User Database (if RADIUS-P AP is enabled) and then by relaying the inf[...]

  • Página 119

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-25 v1.0, March 2008 Manually Assigning IP Addresses to Remote Users (ModeConfig) T o simply the process of connecting remote VPN clients to the FVS338, the ModeConfig module can be used to assign IP addresses to remote u sers, including a netw ork acce ss IP address, subn[...]

  • Página 120

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-26 Virtual Private Ne tworking v1.0, March 2008 ModeConfig Operation After IKE Phase 1 is complete, the VPN connectio n initiator (remote user/client) asks for IP configuration parameters such as IP address, subnet mask and name server addresses. The ModeConfig module will allocat e an IP addres s[...]

  • Página 121

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-27 v1.0, March 2008 9. Specify the VPN policy settings . These settings must match the configuration of the remote VPN client. Recommended settings are: • SA Lifetime: 3600 sec onds • Authentication Algorithm: SHA-1 • Encryption Algori thm: 3DES 10. Click Apply . Th[...]

  • Página 122

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-28 Virtual Private Ne tworking v1.0, March 2008 2. Click Add to configure a new IKE Policy . The Add IKE Policy screen will display . 3. Enable Mode Config by checking the Ye s radio box and selecting the Mode Config record you just created from the pull-down menu. (Y ou ca n view the parameters o[...]

  • Página 123

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-29 v1.0, March 2008 9. If Edge Device was enabled, select the Authentication T ype from the pull down menu which will be used to verify accoun t information: User Database, RADIUS-CHAP or RADIUS-P AP . Users must be added thorough the User Database screen (see “User Dat[...]

  • Página 124

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-30 Virtual Private Ne tworking v1.0, March 2008 Configuring the ProSafe VP N Client for ModeConfig From a client PC running NETGEAR ProSafe VP N Client software, configure the remote VPN client connection. T o configure the client PC: 1. Right-click the VPN client icon in the W indows toolbar . In[...]

  • Página 125

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-31 v1.0, March 2008 b. From the Select Certificate pull-down menu, select None. c. From the ID T ype pull-down menu, select Doma in Name and create an identifier based on the name of the IKE pol icy you cr eated; for example “remote_id.com”. d. Under V irtual Adapter [...]

  • Página 126

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-32 Virtual Private Ne tworking v1.0, March 2008 5. Click on Key Exchange (Phase 2) on the left-sid e of the menu and select Proposal 1. Enter the values to match your configuration of the VPN firewall ModeConfig Record menu. (The SA Lifetime can be longer , such as 8 hours (28800 seconds)). 6. Cli[...]

  • Página 127

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-33 v1.0, March 2008 T o test the connection: 1. Right-click on the VPN client icon in th e W indows toolbar and select Connect. The connection policy you configured will appear; in this case “M y Connectionsm odecfg_test”. 2. Click on the connection. W ithin 30 secon[...]

  • Página 128

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-34 Virtual Private Ne tworking v1.0, March 2008 2. Click Br owse to locate the trusted certificate on your computer and then click Upload . The certificate will be stored on the router and will display in the T rusted Certificates tabl e. Self Certificates Active Self certificates are certificates[...]

  • Página 129

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-35 v1.0, March 2008 • Name – Enter a name that will identify this Certificate. • Subject – This is the name which other organizatio ns will see as the Hol der (owner) of the Certificate. Since this name will be seen by other organizations, you should use your regi[...]

  • Página 130

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-36 Virtual Private Ne tworking v1.0, March 2008 . T o submit your Self Certificate request to a CA: 1. Connect to the web site of the CA. 2. Start the Self Certificate request procedure. 3. When prompted for the requested data, copy the data from your saved data file (including “--- -BEGIN CER T[...]

  • Página 131

    FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-37 v1.0, March 2008 When you obtain th e certificate from the CA, you can then upload it to your computer . Click Browse to locate the Certificate file and then click Upload. The certificate will display in the Active Self Certificates table (see Figure 5 -25 ). Certifica[...]

  • Página 132

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-38 Virtual Private Ne tworking v1.0, March 2008[...]

  • Página 133

    Router and Network Ma nagement 6-1 v1.0, March 2008 Chapter 6 Router and Network Management This chapter describes how to use the network manag eme nt features of your ProSa fe VPN Firewall 50. These features can be found by cli cking on the appropriate heading in the Main Menu of the browser interface. The ProSafe VPN Firewall 50 offers many tools[...]

  • Página 134

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-2 Router and Network Man a ge m en t v1.0, March 2008 Service Blocking Y ou can control specific outbound traffic (for example., from LAN to W AN). Outbound Services lists all existing rules for outbound traffic. If you have not defined any rules, only the default rule will be listed. The default [...]

  • Página 135

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-3 v1.0, March 2008 See “Using Rules to Block or Allo w Specific Kinds of Traf fic ” on page 4-1 for the procedure on how to use this feature. Services. The Rules menu contains a list of predefined Services for creating firewall rules. If a service does not appear i[...]

  • Página 136

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-4 Router and Network Man a ge m en t v1.0, March 2008 Y ou can bypass keyword blocking fo r trusted domains by adding th e exact matching domain to the list of T rusted Domains. Access to the doma ins on this list by PCs even in the groups for which keyword blocking has been enabled w ill still be[...]

  • Página 137

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-5 v1.0, March 2008 Y ou can control specific inbound traffic (i .e., from W AN to LAN and from W AN to DMZ). Inbound Services lists all existing rules for inbound traf fic. If you have not defined any rules, only the default rule will be listed. The defa ult rule block[...]

  • Página 138

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-6 Router and Network Man a ge m en t v1.0, March 2008 • Services – Y ou can specify the desired Services or applications to be covered by this rule. If the desired service or application does not app ear in the list, you must define it using the Services menu (see “Adding Cus tomized Service[...]

  • Página 139

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-7 v1.0, March 2008 Using QoS to Shif t the T raffic Mix The QoS priority settings determine the priority and, in turn, the quality of service for t he traffic passing through the firewall. The QoS is set individually for each service. • Y ou can accept the default pr[...]

  • Página 140

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-8 Router and Network Man a ge m en t v1.0, March 2008 T o modify User or Admin settings: 1. Select Administration from the main menu and Set Password from the submenu. The Set Password screen will display . 2. Select the Settings you wish to edit by checking either the Edit Admin Settings or Edit [...]

  • Página 141

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-9 v1.0, March 2008 Enabling Remote Management Access Using the Remote Manage ment page, you can allo w an administrator on the In ternet to configure, upgrade, and check the statu s of your VPN firewa ll. Y o u must be logged in locally to enable remote management (see[...]

  • Página 142

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-10 Router and Networ k Management v1.0, March 2008 T o configure your firewall for Remote Management: 1. Select the T urn Remote Management On check box. a. Specify what external addresses will be a llowed to access the firewall’ s remote management. b. T o allow access from any IP address on th[...]

  • Página 143

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-11 v1.0, March 2008 2. Specify the Port Number that will be used for accessing the ma nagement interface. W eb browser access normally uses the standard HTTP service port 80. For greater security , you can change the remote manag eme nt W eb in terface to a custom por[...]

  • Página 144

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-12 Router and Networ k Management v1.0, March 2008 3. Specify what external addresses will be allowed to access the firewall’ s remote management. a. T o allow access from any IP addr e ss on the Interne t, select Everyone . b. T o allow access from a range of IP addresses on the Internet, selec[...]

  • Página 145

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-13 v1.0, March 2008 • If you want to make the VPN firewall globa lly accessible using the community string, but still receive traps on the host, enter 0.0.0.0 as the Subnet Mask and an IP Address for where the traps will be received. 3. Enter the trap port number of[...]

  • Página 146

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-14 Router and Networ k Management v1.0, March 2008 Settings Backup and Firmware Upgrade Once you have installed the VPN firewall and have it working p roperly , you should back up a co py of your setting so that it is if something goes wrong. When you backup the settings, they are saved as a file [...]

  • Página 147

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-15 v1.0, March 2008 Y ou must manually restart the VPN firewall in orde r for the default settings to take effect. After rebooting, the router's password will be password and the LAN IP address will be 192. 168.1.1. The VPN firewall will act as a DHCP server on t[...]

  • Página 148

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-16 Router and Networ k Management v1.0, March 2008 T o upgrade router software: 1. Select Administration from the main menu and Settings Backup & Upgrade from the submenu. The Settings Backup and Firmware Upgrad e screen will display . 2. Click Br owse in the Router Upgrade section. 3. Locate [...]

  • Página 149

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-17 v1.0, March 2008 3. If supported in your region, check the Automatically Adjust for Daylight Savings Time radio box. 4. Select a NTP Server option by check ing one of the following radio boxes: • Use Default NTP Servers : If this is enabled, then the R T C (Real-[...]

  • Página 150

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-18 Router and Networ k Management v1.0, March 2008 Enabling the T raffic Meter T o monitor traffic limits on eac h of the W AN ports, select Administration from the main menu and T raffic Meter from the submenu. The Broadband T raffic Meter screen will display . (The Broadband and D ialup ports ar[...]

  • Página 151

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-19 v1.0, March 2008 Setting Login Failures and Att acks Notification Figure 6-8 shows the Firewall Logs & E-mail screen that is invoked by selecting Monitorin g from the main menu and selecting Firewall Logs & E-mail from the submenu. Y ou can send a System lo[...]

  • Página 152

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-20 Router and Networ k Management v1.0, March 2008 Figure 6-8 Select the types of Enable email alerts. events to email. View System Logs Select the segments to track for System Log events. Syslog Server enabled[...]

  • Página 153

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-21 v1.0, March 2008 V iewing Port T riggering St atus Y ou can view the status of Port Triggering by selecting Security from the main menu and Port T riggering from the submenu. When the Port T riggering screen display , click the St a t u s link. Figure 6-9 T able 6-[...]

  • Página 154

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-22 Router and Networ k Management v1.0, March 2008 V iewing Router Configuration and System S tat us The Router S tatus menu provides status and us age information. From the main menu of the browser interface, click on Ma nagement , then select Router S tatus , The Router S tatus scree n will disp[...]

  • Página 155

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-23 v1.0, March 2008 Monitoring W AN Port s St atus Y ou can monitor the status of both of th e W AN connections, the Dynamic DNS Server connections, and the DHCP Se rver connections. Select Network Configuration from the main menu and W A N Se ttings from the submenu.[...]

  • Página 156

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-24 Router and Networ k Management v1.0, March 2008 . Monitoring VPN T unnel Connection St atus Y ou can view the status of the VPN tunnels by selecting VPN from the main menu and Connection S tatus from the submenu. The IPSec Connection S tatus screen will display . Figure 6-1 1 Figure 6-12 T able[...]

  • Página 157

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-25 v1.0, March 2008 VPN Logs The VPN Logs screen gives log details for recent VPN activity . Select Monitoring from the main menu and VPN Logs from the submenu to view the VPN Logs . Y ou can refresh the log display to view the most recent entries, or clear th e log d[...]

  • Página 158

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-26 Router and Networ k Management v1.0, March 2008 Performing Diagnostics Y ou can perform diagnostics such as pinging an IP address, performing a DNS lookup, displaying the routing table, rebooti ng the firewall, and capturing packets. Select Monitoring from the ma in menu and Diagnostics from th[...]

  • Página 159

    FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-27 v1.0, March 2008 Figure 6-15 T able 6-4. Diagnostics Fields Item Description Ping or T race an IP address Ping – Used to send a ping packet requ es t to a specified IP address—most often, to test a connection. If the request times ou t (no reply is received), i[...]

  • Página 160

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-28 Router and Networ k Management v1.0, March 2008 Reboot the Router Used to perform a remote reboot (restart). Y ou can use this if th e Router seems to have become unstable or is not operating normally . Note : Rebooting will break any e xisting connec tions either to the Router (such as this on[...]

  • Página 161

    Troubleshooting 7-1 v1.0, March 2008 Chapter 7 T roubleshooting This chapter provides troubleshooting tips and information for your Pr oSafe VPN Firewall 50. After each problem description, instructions ar e provided to help yo u diagnose and solve the problem. Basic Functions After you turn on power to th e firewall, the following seque nce of eve[...]

  • Página 162

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-2 Troubleshooting v1.0, March 2008 LEDs Never T urn Off When the firewall is turned on, the LEDs turns on for about 10 sec onds and then turn off. If all the LEDs stay on, there is a fault within the firewall. If all LEDs are still on one minute after power up: • Cycle the power to see if the fi[...]

  • Página 163

    FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-3 v1.0, March 2008 • Make sure your PC’ s IP address is on the sam e subnet as the firewall. If you are using the recommended addressing sch eme, yo ur PC’ s address should be in the range of 192.168.0 .2 to 192.168.0. 254. • If your firewall’ s IP address ha s been changed[...]

  • Página 164

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-4 Troubleshooting v1.0, March 2008 T roubleshooting the ISP Connection If your firewall is unable to a ccess the Internet, you should first determine whether the firewall is able to obtain a W AN IP address from the ISP . Un less you have been assigned a static IP address, your firewall must reque[...]

  • Página 165

    FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-5 v1.0, March 2008 – Configu re y our firewall to spoof your PC’ s MAC ad dress. This can be do ne in the Basic Settings menu. Refer to “Configuring your Internet Connection ” on page 2-2 . If your firewall can obtain an IP addre ss, but your PC is unable to load an y W eb pa[...]

  • Página 166

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-6 Troubleshooting v1.0, March 2008 If the path is not functioning correctly , you could h ave one of the following problems: • W rong ph ysical connections – Make sure the LAN port LED is on. If the LED is off, follow the instruct ions in “LAN or Internet Port LEDs Not On ” on page 7-2 . ?[...]

  • Página 167

    FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-7 v1.0, March 2008 Restoring the Default Co nfiguration and Password This section explains how to restore the fact ory default configuratio n settings, changing the firewall’ s administration password to password and the IP address to 192.168.1.1. Y ou can erase the current configu[...]

  • Página 168

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-8 Troubleshooting v1.0, March 2008[...]

  • Página 169

    Default Settings and Technical Specifications A-1 v1.0, March 2008 Appendix A Default Settings and T echnical S pecifications Y ou can use the reset button located on the front of your device to reset all settings to their factory defaults. This is called a hard reset. • T o perform a hard reset, push and hold the reset button for approximately 5[...]

  • Página 170

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual A-2 Default Settings and Technical Specifications v1.0, March 2008 T echnical Specifications for the ProSafe VPN Firewall 50 are listed in the following table. T ime Zone GMT T ime Zone Adj usted for Daylight Saving Ti m e Disabl ed SNMP Disabled Remote Manageme nt Disabled Firewall Inbound (communi[...]

  • Página 171

    FVS338 ProSafe VPN Firewall 50 Reference Manual Default Settings and Technical Specifications A-3 v1.0, March 2008 Environmental S pecifications Operating temperature: 0 ° to 40 ° C (32º to 104º F) Operating humidity: 90% maximum relative humidity , noncondensi ng Electromagnetic Emissions Meets requirements of: FCC Part 15 Class B VCCI Class B[...]

  • Página 172

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual A-4 Default Settings and Technical Specifications v1.0, March 2008[...]

  • Página 173

    System Logs and Error Messa ge s B-1 v1.0, March 2008 Appendix B System Logs and Error Messages This appendix uses the fo llowing log parameter terms. System Log Messages This section describes log messages that be long to one of the following categories: • Logs generated by traffic that is meant for the device. • Logs generated by traf fic tha[...]

  • Página 174

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-2 System Logs and Erro r Messages v1.0, March 2008 Reboot This section describes log messages generated during system reboot. NTP This section describes log messages generated by the NTP daemon during synchronization with the NTP server . • The fixed time and date before NTP sy nchronizes with a[...]

  • Página 175

    FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-3 v1.0, March 2008 Login/Logout This section describes logs ge nerated by the administrativ e interfaces of the device. Firewall Rest art This logging is always done. T able B-4. System Logs: NTP Message Nov 28 12:31:13 [FVS338] [nt pdate] Looking Up time-f.netgear.co[...]

  • Página 176

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-4 System Logs and Erro r Messages v1.0, March 2008 IPSec Rest art This logging is always done. W AN S t atus This section describes the logs generated by th e W AN component. If there are two ISP links for Internet connectivity , the router can be confi gured either in Auto Rollover Mode or Load B[...]

  • Página 177

    FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-5 v1.0, March 2008 Auto Rollover When W AN mode is configured to Auto Rollover , primary link is active and secondary acts as a backup. When primary link goes down, secondary becomes active until primary comes up. The device monitors the status of the prim ary link by[...]

  • Página 178

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-6 System Logs and Erro r Messages v1.0, March 2008 PPP Logs This section describes the W AN PPP connection logs. The PPP type can be configured from the web management. System Logs: W AN Stat us, Auto Rollover Message Nov 17 09:59:09 [FVS338] [wan d] [L BFO] W AN1 T est Failed 1 of 3 times_ Nov 17[...]

  • Página 179

    FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-7 v1.0, March 2008 PPPoE Idle-Timeout Logs. T able B-9. System Logs: W A N St atus, PPE, PPPoE Idle-Timeout Message Nov 29 13:12:46 [FVS33 8 ] [pppd] S tarting connection Nov 29 13:12:49 [FVS338] [ppp d] Remote messa ge: Success Nov 29 13:12:49 [FVS338] [ppp d] P AP a[...]

  • Página 180

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-8 System Logs and Erro r Messages v1.0, March 2008 PPTP Idle-T imeout Logs. PPP Authentication Logs. We b Filtering and Content Filtering Logs T o enable web keyword filtering logs, set value of keywordLog to 1 from CLI. Command to set this value fro m CLI: monitor/firewallLogs/logger/ loggerConfi[...]

  • Página 181

    FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-9 v1.0, March 2008 T able B-12. System Logs: W eb Filtering and Content Filtering Message Jan 23 16:36:35 [FVS338] [ker nel] [KEYWORD_BL OCKED] [URL]==>[ www .redhat.com/ ] IN=SELF OUT=SELF SRC=19 2.168.10.210 DST=209.132.177.50 PROTO=TCP SPT=4282 DPT=80 Explanatio[...]

  • Página 182

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-10 System Logs and Error Messages v1.0, March 2008 T raffic Metering Logs Unicast Logs ICMP Redirect Logs T able B-13. System Logs : T raffic Metering Message Jan 23 19:03:44 [TRAFFIC_METER] TRAFFIC_METER: Monthly Limit o f 10 MB has reached for W AN1._ Explanation T raffic limit to W AN1 t hat wa[...]

  • Página 183

    FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-11 v1.0, March 2008 Multicast/Broadcas t Logs FTP Logging Invalid Packet Logging T able B-16. System Logs : Mult icast/Broadcast Message Jan 1 07:24:13 [FVS338] [kernel] MCAST -BCAST IN=W AN OUT=SELF SRC=192.168.1.73 DST= 19 2.168.1.255 PROTO=UDP SPT=138 DPT=138 Expla[...]

  • Página 184

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-12 System Logs and Error Messages v1.0, March 2008 Recommended Action 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 T o allow invalid packet and disable logging: fw/rules/attackChecks/configu[...]

  • Página 185

    FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-13 v1.0, March 2008 Recommended Action 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 T o allow invalid packet and disable logging: fw/rules/attackChecks/configur[...]

  • Página 186

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-14 System Logs and Error Messages v1.0, March 2008 Routing Logs This section is used to configure the logging options for each network segment lik e LAN-W AN for debugging purposes. This may generate a significant volume of log messages. Message 2007 Oct 1 00:44:17 [FVX538] [kernel] [INV ALID][REO[...]

  • Página 187

    FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-15 v1.0, March 2008 LAN to W AN Logs LAN to DMZ Logs DMZ to W AN Logs W AN to LAN Logs T able B-19. Routing Logs: LAN to W AN Message Nov 29 09:19:43 [FVS338] [kernel ] LAN2WAN[ACCEP T] IN=LAN OUT=W AN SRC=192.168.10.10 DST= 72.14.207.99 PR OTO=ICMP TYPE=8 CODE=0 Expl[...]

  • Página 188

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-16 System Logs and Error Messages v1.0, March 2008 DMZ to LAN Logs W AN to DMZ Logs T able B-23. Routing Logs: DMZ to W AN Message Nov 29 09:44:06 [FVS338] [ker nel] DMZ2LAN[DROP] IN=DMZ OUT=LAN SRC=192.168.20. 10 DST=192.168.1 0.10 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from DMZ to [...]

  • Página 189

    Related Documents C-1 v1.0, March 2008 Appendix C Related Document s This appendix provides links to reference documents you c an use to gain a more com ple te understanding of the technolog ies used in your NETGEAR prod uct. Document Link Internet Netw orking and TCP/IP Addressing: http://documenta tion.netgear .com/r eference/enu/tcpip/index.htm [...]

  • Página 190

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual C-2 Related Documents v1.0, March 2008[...]

  • Página 191

    Index-1 v1.0, March 2008 Index A Add LAN W AN Inbound Service scr een 4-9 , 4-15 Add LAN W AN Outbound Service screen 4-8 address reservation 3-10 AH VPN Policies, use with 5-7 ARP 3-6 Attack Checks Block TCP Flood 4-10 Respond T o Ping On Internet 4-10 Stealth Mode 4-10 Attack Checks screen 4-10 , 4-1 1 Attacks Notifica ti o n 6-19 Authentication [...]

  • Página 192

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-2 v1.0, March 2008 D date troubleshooting 7-7 Daylight Savings T ime setting 6-17 Dead Peer Detectio n 5-5 default configuration restoring 7-7 default firewall rules 4-1 Inbound 4-1 Outbound 4-2 Default Outbound Policy LAN W AN 4-7 denial of service attack 4-10 UDP flood 4-1 1 Denial of Servic[...]

  • Página 193

    FVS338 ProSafe VPN Firewall 50 Reference Manual Index-3 v1.0, March 2008 technical specification s A-1 firewall access remote management 6- 9 Firewall Logs configuring 4-34 emailing of 4-32 Firewall Logs & E-mai l sc re en 4-33 , 6-19 firewall protection 4-1 firewall rules about 4-1 order ing 4-6 firmware upgrade 6-14 FQDN use in VPN tunnels 5-[...]

  • Página 194

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-4 v1.0, March 2008 examples of 4-23 L L2TP VPN T unnel 4-1 1 LAN configuration 3-1 ports and attached devices 6-25 LAN Security Checks UDP flood 4-1 1 LAN Setup Enable DHCP Server 3-3 Enable DNS Proxy 3-3 IP Address 3-2 IP Address Pool 3-3 IP Subnet Mask 3-3 WINS Server IP 3-3 LAN Setup screen[...]

  • Página 195

    FVS338 ProSafe VPN Firewall 50 Reference Manual Index-5 v1.0, March 2008 P package contents 1-4 Packet Trace 6-28 Passwords changing 6-7 restoring 7-7 performance management 6- 1 Ping T roubleshooting TCP/IP 7-5 pinging an IP address 6-26 port filterin g 4-2 Outbound Rules 4- 2 Port Forwarding 4-2 , 4-4 , 6-4 Inbound Rules 4-4 port forwarding 6-4 p[...]

  • Página 196

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-6 v1.0, March 2008 blocking traffic 4-1 service blocking 4-2 services-based 4-2 S Schedule blocking traffic 4-21 rules, covered by 6-2 Schedule 1 screen 4-21 Security 1-2 Security Policy Editor scre en 5-15 Self Certificate format of 5-35 Request, generating 5-34 Self Certif icate request subm[...]

  • Página 197

    FVS338 ProSafe VPN Firewall 50 Reference Manual Index-7 v1.0, March 2008 LEDs Never T urn Off 7-2 NTP 7-7 Power LED Not On 7-1 W eb configuration 7-2 T rusted Certificates 5-33 about 5-3 3 U UDP flood denial of service attack 4-1 1 upgrade firmware 6-14 upgrade router steps to 6-16 User Database configuring 5-22 XAUTH, use with 5-21 User Database s[...]

  • Página 198

    FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-8 v1.0, March 2008[...]