Gebruiksaanwijzing /service van het product FVS338 van de fabrikant NETGEAR
Ga naar pagina of 198
March 2008 202-10046-06 v1.0 NETGEAR , Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA FVS338 ProSafe VPN Firewall 50 Reference Manual.
ii v1.0, March 2008 © 2007 by NETGEAR, Inc. All rights reserved. T rademarks NETGEAR, the NETGEAR logo a nd ProSafe are trademarks and/or regist ered trademarks of NETGEAR, Inc. Microsoft, W indows, and W indow s NT are registered trademar ks of Microsoft Corporation.
v1.0, March 2008 iii Federal Of fice for T elecommuni cations Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for complianc e with the regulations.
v1.0, March 20 08 iv Open SSL Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitte d provided that the follo wing conditions * are me t: 1.
v1.0, March 2008 v MD5 Copyright (C) 1990, RSA Data Se curity , Inc. All rights reserved. License to copy and u se this software is granted provided that it is id entified as the "RSA Data Security , Inc. MD5 Message-Digest Algori thm" in all material mentioning or referencing this software or this function.
v1.0, March 20 08 vi Product and Publication Det ails Model Number: FVS338 Publication Date: March 2008 Product Family: VPN firewall Product Name: ProSafe VPN Firewall 50 Home or Business Prod uc t: Business Language: Engl ish Publication Part Number: 202-10046-06 Publication V ersion Number 1.
Contents vii v1.0, March 2008 Content s About This Manual Conventions, Formats and Scope ................ ................ ............. ................ ............. ......... xiii How to Use This Manual ........................ ................ ...
viii Contents v1.0, March 2008 Configuring the WAN Mode ... ................ .......... ... ............. ............. ................ ............. ... 2-15 Configuring Dynamic DNS (If N eeded) ..... ................ ................. .............
Contents ix v1.0, March 2008 Setting Block Sites (C ontent F iltering) ...... ................ ............. ................. ............ .......... 4-22 Enabling Source MAC Filtering .......................... ............. ............. ..........
x Contents v1.0, March 2008 Configuring the ProSafe VPN Client for Mode Config ................... ....... ...... ....... ...... 5-30 Certificates ............. ................ ................ ................ ................ ................. ....
Contents xi v1.0, March 2008 Performing Diagnostics ................ ............. ............. ............. ............. ............ .......... 6-26 Chapter 7 T roubleshooting Basic Functions .................. ............. ................ ....
xii Contents v1.0, March 2008 Routing Logs ...... ............ ............. ................. ............ ................. ............. ............ ......... B-1 4 LAN to W AN Logs .... ............. ................. ............ ............. .
xiii v1.0, March 2008 About This Manual The NETGEAR ® ProSafe™ VPN Fir ewall 50 FVS338 Refer ence Manual describes how to install, configure and trou bleshoot the ProSafe VPN Fire wall 50. The information i n this manual is intended for readers with intermedia te computer and Internet skills.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual xiv About This Manual v1.0, March 2008 • Scope. This manual is written for the VPN fir ewall according to these specifications: For more information about networ k, Internet, firewall, and VPN technologies, see the links to the NETGEAR website in Appendix C, “Related Documents” .
FVS338 ProSafe VPN Firewall 50 Reference Manual About This Manual xv v1.0, March 2008 • Printing from PDF . Y our computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe W eb site at http://www .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual xvi About This Manual v1.0, March 2008.
Introduction 1-1 v1.0, March 2008 Chapter 1 Introduction The ProSafe VPN Firewall 50 with 8 port switch c onnects your local area network (LAN) to the Internet through an extern al access device such as a cable modem or DSL modem. The FVS338 is a complete security solution that protects your network from attacks and intrusions.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-2 Introduction v1.0, March 2008 • Flash memory for firmware upgrade. Full Routing on Both the Br oadband and Serial W AN Port s Y ou can install, .
FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-3 v1.0, March 2008 • Port Forwarding with NA T . Although NA T prevents Intern et locations from directly accessing the PCs on the LAN, the firewall allows you to direct incomi ng traffic to specific PCs based on the service port number of the incoming request.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-4 Introduction v1.0, March 2008 Easy Inst allation and Management Y ou can install, configure, and operate the ProSafe VPN Firewall 50 within minutes after connecting it to the network. Th e following featur es simplify in stallation and management tasks: • Browser -based management .
FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-5 v1.0, March 2008 • ProSafe VPN Firewall 50. •A C p o w e r a d a p t e r . • Category 5 Ethernet cabl e. • Resour ce CD , including: – Application Notes and ot her helpful information.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-6 Introduction v1.0, March 2008 Router Rear Panel The rear panel of the ProSafe VPN Firewall 50 ( Figure 1-2 ) contains the On/Off switch and AC power connection. T able 1-1. Object Descriptions Object Activity Description Power LED On (Green) Off Power is supplied to the router .
FVS338 ProSafe VPN Firewall 50 Reference Manual Introduction 1-7 v1.0, March 2008 V iewed from left to right, the rear panel contains the following elements: • Modem port – serves as the W AN2 Internet port through the public switched telephone network (PSTN).
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 1-8 Introduction v1.0, March 2008 T o log in to the FVS3 38 once it is connected: 1. Open a W eb browser .
2-1 v1.0, March 2008 Chapter 2 Connecting the FVS338 to the Internet This section provides instructio ns for connecting the VPN firewa ll. Setting up VPN tunnels are covered in Chapter 5, “V irtual Private Networking” : 1. Connect the fir ewall physi cally to your network .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-2 Connecting the FVS338 to the Intern et v1.0, March 2008 T o log in to the VPN firewall: St e p 1 . Open a Internet Explorer, Netscape® Naviga tor , or Firefox browse r . In the browser window , enter http://192.
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-3 v1.0, March 2008 2. Click Auto Detect at the bottom of the screen to automatic ally detect the type of Internet connection provided by your IS P .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-4 Connecting the FVS338 to the Intern et v1.0, March 2008 3. Click Broadband S t a tus at the to p right of the screen to verify you r Broa dband connection status. Click Conne ct if connection not already present.
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-5 v1.0, March 2008 St e p 1 . Select Network Configuration from the main menu, W AN Settings from the submenu and click the Dialup ISP Settings tab to display the Dialup settings screen.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-6 Connecting the FVS338 to the Intern et v1.0, March 2008 3. Specify the method to use for your Dial-up Connection S tatus. The VPN firewall can automatically dial to the ISP wh en a connection is needed or can be configured to wait for manual intervention.
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-7 v1.0, March 2008 Set up the traffic meter for the Dialup ISP if desired (see “Programming the T raffic Meter (if Desired)” on page 2-12 ).
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-8 Connecting the FVS338 to the Intern et v1.0, March 2008 This could occur on some older broadband modems. If you k now that the Ethernet port on your broadband mo dem supports 100Bas eT , select 100BaseT ; oth erwise, select 10BaseT .
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting the FVS3 3 8 to the Internet 2-9 v1.0, March 2008 . Manually Configuring Y o ur Internet Connection If you know your Broadband ISP connection type, you can bypass the Auto Detect feature and connect your router manually .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-10 Connecting the FVS338 to the Intern et v1.0, March 2008 T o manually configure your W AN1 ISP setting s: St e p 1 . Does your Internet connection require a login ? If you need to ente r login information every time you connect to the Internet through your ISP , select Y es.
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-11 v1.0, March 2008 – Domain Name : Y our domain name or workgroup name assigned by your ISP , or your ISPs domain name. Y ou may leave this field blank. – Idle Timeout : Check the Keep Connected radio bo x to keep the connection always on.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-12 Connecting the FVS338 to the Intern et v1.0, March 2008 4. If your ISP has not assigned any Domain Name Servers (DNS) addresses, select the Get dynamically from ISP radio box. If your ISP has a ssigned DNS addresses, select the Use these DNS Servers radio box.
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-13 v1.0, March 2008 Figure 2-8.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-14 Connecting the FVS338 to the Intern et v1.0, March 2008 T able 2-2. T raffic Meter Settings Parameter Description Enable T raffic Meter Check this if you wish to record the volume of Internet traffic passing through the Router's Broadband or Dial up po rt.
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-15 v1.0, March 2008 Configuring the W AN Mode The WA N M o d e screen allows you to configure how your router uses your external Internet connections; for example, your W AN port or dialup modem co nnections.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-16 Connecting the FVS338 to the Intern et v1.0, March 2008 • If you have both ISP lin ks co nnected for Internet connectivity , check the Primary Broadband with Dialup as backup for auto-rollover .
FVS338 ProSafe VPN Firewall 50 Reference Manual Connecting th e FVS33 8 to the In te rn et 2-17 v1.0, March 2008 This router firmware includes software that not ifies dynamic DNS servers of changes in the W AN IP address, so that the services running on this network can be acce ssed by others on the Internet.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 2-18 Connecting the FVS338 to the Intern et v1.0, March 2008 If you have configured Single Po rt, select the tab for a DNS serv ice provider , then fill out the DDNS section for that port. If you have enabled Auto-Rollover , choose a service provider and complete both sections.
LAN Configuration 3-1 v1.0, March 2008 Chapter 3 LAN Configuration This chapter describes how to configure LAN Setu p, LAN Groups and Routin g (Static IP) features of your ProSafe VPN Firewall 50. These features can be found under the Network Configuration menu of the router interface.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-2 LAN Configuration v1.0, March 2008 T o modify your LAN setup: 1. Select Network Configuration from the main menu and LAN Setup from the submenu. The LAN Setup screen will display . 2. Enter the IP Addr ess of your router (factory default: 192.
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-3 v1.0, March 2008 3. Enter the IP Subnet Mask . The subnet mask specifies the ne twork number portion of an IP address. Y our router will automatically calculate the subnet mask based on the IP address that you assign.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-4 LAN Configuration v1.0, March 2008 The feature is particularly useful in Auto Rollover mode. For example, if the DNS se rvers for each connection are different, then a link failure may rend er the DNS servers inaccessible.
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-5 v1.0, March 2008 The A vailable Secondary LAN IPs ta ble lists the secondary LAN IP addresses added to the router . • IP Address : The IP address alias added to the LAN port of the router .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-6 LAN Configuration v1.0, March 2008 Managing Group s and Hosts The Known PCs and Devices table on th e Groups and Hosts screen contains a list of all known PCs and network devices, as well as hosts, that ar e assigned dynamic IP addresses by this router .
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-7 v1.0, March 2008 • MAC-level Control over PCs. The Network Da tabase uses the MAC address to identify each PC or device. So changing a PC 's IP address does not affect any restrictions on that PC.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-8 LAN Configuration v1.0, March 2008 The Network Database is created by: • Using the DHCP Server : The rout er ’ s DHCP server is configured, by default, to respond to DHCP requests from clients on the LAN.
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-9 v1.0, March 2008 • Name : The name of the computer or device. Co mputers that do not support the NetBIOS protocol will be listed as Unknown. In this case , the name can be edit ed manually for easier management.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-10 LAN Configuration v1.0, March 2008 Setting Up Address Reservation When you specify a reserved IP address for a de vice on the LAN (based on the MAC address of the device), that computer or device will always receive the same IP address each time it accesses the firewall’ s DHCP server .
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-11 v1.0, March 2008 5. Ty p e t h e Destination IP Address or network of the route’ s final destination. 6. Enter the IP Subnet Mask for this destinat ion. If the des tination is a single host, enter 255.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-12 LAN Configuration v1.0, March 2008 • Y ou have an ISDN firewall on your home network for con necting to the company where you are employed. This firewall’ s address on your LAN is 192.168.1 .100.
FVS338 ProSafe VPN Firewall 50 Reference Manual LAN Configuration 3-13 v1.0, March 2008 T o enable RIP: 1. Select Network Configuration from the main menu and Routing from the submenu. The Routing screen will display . 2. Click the RIP Configuration link.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 3-14 LAN Configuration v1.0, March 2008 • None – the router neither broadcasts its rout e table nor does it accept any RIP packets from other routers.
Firewall Protection and Conten t Filtering 4-1 v1.0, March 2008 Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with W e b content filtering options such as Block Sites and Keyword Blocking.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-2 Firewall Protection and Content Filtering v1.0, March 2008 • Outbound : Allow all access from the LAN side to the outside. Services-Based Rules The rules to block traffic are based on the traffic’ s category of service.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 3 v1.0, March 2008 T able 4-1. Outbound Rules Fields Item Description Services Select the desired Service or appli c ati on to be covered by this rule.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-4 Firewall Protection and Content Filtering v1.0, March 2008 Inbound Rules (Port Forwarding) Because the FVS338 uses N etwork Address T ransla tion (NA T), your network presents only one IP address to the Internet and outside users cannot directly address any of your local computers.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 5 v1.0, March 2008 T able 4-2. Inbound Rules Fields Item Description Services Select the desired Service or appli c ati on to be covered by this rule.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-6 Firewall Protection and Content Filtering v1.0, March 2008 Remember that allowing inbound services opens holes in your VPN firewall.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 7 v1.0, March 2008 Setting LAN W AN Rules The Default Outbound Policy is to allow all traf fic from and to the Inte rnet to pass through.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-8 Firewall Protection and Content Filtering v1.0, March 2008 1. In the Action column adjacent to the rule click: • Edit – to make any ch anges to the rule definition of an existing rule.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4- 9 v1.0, March 2008 . LAN W AN Inbound Services Rules This Inbound Services Rules tabl e lists all existing rules for in bound traf fic. If you have not defined any rules, no rules will be listed.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-10 Firewall Protection and Content Filtering v1.0, March 2008 Att ack Checks This screen allows you to specify whether or no t the router should be protected against common attacks in the LAN and W AN networks.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -11 v1.0, March 2008 • LAN Security Ch ecks. A UDP flood is a form of denial of service attack that can be initiated when one machine sends a large nu mber of UDP packets to random ports on a remote host.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-12 Firewall Protection and Content Filtering v1.0, March 2008 . Session Limit Session Limit allows you to spec ify the total number of sessions per user over an IP (Internet Protocol) connection allowed across the router .
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -13 v1.0, March 2008 T o enable Session Limit : 1. Click the Y es radio button under Do you want to enable Session Limit ? 2.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-14 Firewall Protection and Content Filtering v1.0, March 2008 Allowing Vi deoconference from Restricted Addresses If you want to allow incoming vi deoconferencing to be initiated from a restricted range of outside IP addresses, such as from a branch office, you can create an inbound rule.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -15 v1.0, March 2008 Setting Up One-to-One NA T Mapping In this example, we will configure multi-NA T to support multiple public IP addresses on one W AN interface.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-16 Firewall Protection and Content Filtering v1.0, March 2008 6. From the Public Destination IP Address pull down menu, choose Other Public IP Address. 7. Enter one of your public Internet addresses that will be used by c lients on the Internet to reach your W eb server .
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -17 v1.0, March 2008 T o test the connection from a PC on the Internet, type http:// <IP_address> , where <IP_address> is the public IP address you have mapped to your W eb server .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-18 Firewall Protection and Content Filtering v1.0, March 2008 Outbound Rules Example – Bl ocking Inst ant Messenger Outbound rules let you prev ent users from using applications such as AOL Instant Messenger , Real Audio or othe r non-essential sites.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -19 v1.0, March 2008 Although the FVS338 already holds a list of many service port numbers, you are not limited to these choices. Use the Services menu to add additional services and applications to the list for use in defining firewall rules.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-20 Firewall Protection and Content Filtering v1.0, March 2008 T o add a service: 1. Select Security from the main menu and Services from the submenu. The Services screen will display . 2. In the Add Custom Service table, enter a descriptive name for the service (this is for your convenience).
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -21 v1.0, March 2008 • Normal-Service: No special priority given to the traf fi c. The IP packets for servic es with this priority are marked with a T oS value of 0.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-22 Firewall Protection and Content Filtering v1.0, March 2008 Repeat these 5 steps to set to a schedule for Schedule 2 and Schedule 3 .
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -23 v1.0, March 2008 Y ou can bypass Keywor d blo cking for truste d domains by add i ng the exact m atching domain to the list of T rusted Domains.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-24 Firewall Protection and Content Filtering v1.0, March 2008 Enabling Source MAC Filtering Source MAC Filter allows you to filter out tr af fic coming from certain known machines or devices. • By default, the source MAC address filter is disabled.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -25 v1.0, March 2008 • When enabled, traffic will be dropped coming from any comp uters or devices whose MAC addresses are listed in A v ailable MAC Addresses to be Blocke d table.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-26 Firewall Protection and Content Filtering v1.0, March 2008 6. When you have completed ad ding MAC addresses, click Apply to save your settings. IP/MAC Binding IP/MAC Bindi ng allows you to bind an IP to a MAC address and vice-versa.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -27 v1.0, March 2008 The IP/MAC Binding T able lists the cu rrently defined IP/MAC Bind rules: • Name : Displays the user-defi ned name for this rule. • MAC Addresses : Displays the MAC Addresses for this rule.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-28 Firewall Protection and Content Filtering v1.0, March 2008 4. T o remove an entry from the table, sel ect the IP/MAC Bind entry and click Delete .
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -29 v1.0, March 2008 2. From the Enable pull-down menu, indicate if th e rule is enabled or disabled. 3. From the Protocol pull-down menu, select either TCP or UDP protocol.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-30 Firewall Protection and Content Filtering v1.0, March 2008 b. Enter the End Port range (1 - 65534). 6. Click Add. The Port T riggering Rule will be added to the Port T riggering Rules table. T o edit or modify a rule: 1.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -31 v1.0, March 2008 • Bandwidth limiting for outbound traf fic is done on the available W AN interface in both the single port and Auto Rollover modes. Bandwidth limiting is ha ndl ed on the user-specified interface in Load Balancing mode.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-32 Firewall Protection and Content Filtering v1.0, March 2008 • WA N : Displays the W AN interface fo r the Load Balancing mode. 2. Click Add to add a new Band width Profile. When the Add New Bandwidth Profile screen displays, enter the following: a.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -33 v1.0, March 2008 other general information based on the settings you input on the Firewall Logs & E-mail screen.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-34 Firewall Protection and Content Filtering v1.0, March 2008 T o set up Firewall Logs and E-mail alerts: 1. Select Monitoring from the main me nu and then Fir ewall Logs & E-mail from the submenu.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -35 v1.0, March 2008 • LOG_W ARNING (W arning conditions) • LOG_NOTICE (Normal but significant conditions) • LOG_INFO (Informational messages) • LOG_DEBUG (Debug level messages) 10.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-36 Firewall Protection and Content Filtering v1.0, March 2008 Administrator Information Consider the following operational items: 1.
FVS338 ProSafe VPN Firewall 50 Reference Manual Firewall Protection and Content Filtering 4 -37 v1.0, March 2008.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 4-38 Firewall Protection and Content Filtering v1.0, March 2008.
Virtual Private Networking 5-1 v1.0, March 2008 Chapter 5 V irtual Private Networking This chapter describes how to u se the V irtua l Private Networking (VPN) features of the VPN firewall. VPN tunnels provide secure, encrypted communications between your local network an d a remote network or computer .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-2 Virtual Private Networking v1.0, March 2008 Setting up a VPN Connect ion using the VPN Wizard Setting up a VPN tunnel connection requires that al l settings and parameters on both sides of the VPN tunnel match or mirror each other pre cisely , whic h can be a daunting tas k.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-3 v1.0, March 2008 The Local W AN IP address is the address used in the IKE negotiation phase. Automatically , the W AN IP address assigned by your ISP may display . Y ou can modify the address to use your FQDN; required if the W AN Mode you selected is auto-rollover .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-4 Virtual Private Networking v1.0, March 2008 IKE Policies The IKE (Internet Key Exchange) protocol performs negotiations between the two VPN Gateways, and provides automatic ma nagement of the Keys used in IPSec.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-5 v1.0, March 2008 • Name . Uniquely identifies each IKE policy . The name is chosen by you and used for the purpose of managing your policies; it is not su pplied to the remote VPN Server .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-6 Virtual Private Networking v1.0, March 2008 In addition, a CA (Certificate Authority) can also be used to perform authentication (see “Certificates” on page 5- 33 ). T o use a CA, each VPN Gatewa y must have a Certificate from the CA.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-7 v1.0, March 2008 – Reconnect after failur e count : Fresh negotiation starts wh en no acknowledgement is received for the specified number of consecutive packets. • Local .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-8 Virtual Private Networking v1.0, March 2008 Creating a VPN Gateway Conn ection: Between FVS338 and FVX538 This section describes how to configure a VP N connection between a NETGEAR FVS338 VPN Firewall and a NETGEAR FVX538 VPN Firewall.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Networking 5-9 v1.0, March 2008 The IKE Policies screen will display showin g the new “to_fvx” policy . Y ou can view the IKE para meters by clicking Edit in the Action column adjacent to the “to- fvs” policy .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-10 Virtual Private Ne tworking v1.0, March 2008 Click the IKE Policies tab to view the corresp onding IKE Policy . The IKE Policies screen will display . Y ou can view the VPN parameters by clicking Edit in the Actions column adjacent to “to_fvx”.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-11 v1.0, March 2008 Configuring the FVX538 T o configure the FVX538 using the VPN W izard: 1. Select VPN from the main menu. The Policies screen will display . Click the VPN Wizard link.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-12 Virtual Private Ne tworking v1.0, March 2008 6. Enter the remote LAN IP address and subnet mask. 7. Click Apply to create the “to_fvs” IKE and VPN policies. T e sting the Connectio n 1. From a PC on either firewa ll’ s LAN, try to ping a PC on the other firewall’ s LAN.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-13 v1.0, March 2008 Using the FVS338 VPN W izard, we will create a si ngle set of policies (IKE and VPN) that will allow up to 50 remote PCs to connect from locatio ns in which their IP addresses are un known in advance.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-14 Virtual Private Ne tworking v1.0, March 2008 Configuring the VPN Client On a remote PC that has a NETGEAR ProSafe VPN C lient installed, configur.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-15 v1.0, March 2008 T o configure the VPN Client: 1. Right-click on the VPN client icon in your W indows toolbar and select the Security Pol icy Editor . The Security Policy Editor screen will display .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-16 Virtual Private Ne tworking v1.0, March 2008 8. In the left frame, click on My Identity (shown in Figure 5-1 0 ). 9. From the Select Certificate pull-down menu, select None . 10. From the ID T ype pull-down menu, select Domain Name and enter fvs_remote.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-17 v1.0, March 2008 12. Before leaving the My Identity menu, click Pr e-Shared Key . 13. Click Enter Key , and type your preshared key . Click OK . This key will be shared by all users of the FVS338 policy “home”.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-18 Virtual Private Ne tworking v1.0, March 2008 14. In the left frame, click Security Policy (shown in Figure 5-12 ). 15. Select Phase 1 Negotiation Mo de by checking the Aggressive Mode radio box. 16.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-19 v1.0, March 2008 18. In the left frame, expand Key Exchange (Phase 2) and select Proposal 1 . Compare with the figure below . No changes should be neces sary . 19. In the upper left of the window , click the disk icon to save t he policy .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-20 Virtual Private Ne tworking v1.0, March 2008 Extended Authentication (XAUTH) Configuration When connecting many VPN clients to a VPN gateway router , an administrator may want a unique user authentication method beyond relying on a single common preshared key for all clien ts.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-21 v1.0, March 2008 . Configuring XAUTH for VPN Client s Once the XAUTH has been enabled, you must establish user ac count s on the Local Database to be authenticated against XAUTH, or you must en able a RADIUS-CHAP or RADIUS-P AP server .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-22 Virtual Private Ne tworking v1.0, March 2008 • IPSec Host if you want to be authenticated by the remote gateway .
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-23 v1.0, March 2008 3. Enter a Password for the user , and reenter the password in the Confirm Password field. 4. Click Add. The User Name will be added to the Configured Hosts table.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-24 Virtual Private Ne tworking v1.0, March 2008 information such as a username/password or some encrypted response using his username/ password information.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-25 v1.0, March 2008 Manually Assigning IP Addresses to Remote Users (ModeConfig) T o simply the process of connecting remo.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-26 Virtual Private Ne tworking v1.0, March 2008 ModeConfig Operation After IKE Phase 1 is complete, the VPN connectio n initiator (remote user/client) asks for IP configuration parameters such as IP address, subnet mask and name server addresses.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-27 v1.0, March 2008 9. Specify the VPN policy settings . These settings must match the configuration of the remote VPN client. Recommended settings are: • SA Lifetime: 3600 sec onds • Authentication Algorithm: SHA-1 • Encryption Algori thm: 3DES 10.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-28 Virtual Private Ne tworking v1.0, March 2008 2. Click Add to configure a new IKE Policy . The Add IKE Policy screen will display . 3. Enable Mode Config by checking the Ye s radio box and selecting the Mode Config record you just created from the pull-down menu.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-29 v1.0, March 2008 9. If Edge Device was enabled, select the Authentication T ype from the pull down menu which will be used to verify accoun t information: User Database, RADIUS-CHAP or RADIUS-P AP .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-30 Virtual Private Ne tworking v1.0, March 2008 Configuring the ProSafe VP N Client for ModeConfig From a client PC running NETGEAR ProSafe VP N Client software, configure the remote VPN client connection.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-31 v1.0, March 2008 b. From the Select Certificate pull-down menu, select None. c. From the ID T ype pull-down menu, select Doma in Name and create an identifier based on the name of the IKE pol icy you cr eated; for example “remote_id.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-32 Virtual Private Ne tworking v1.0, March 2008 5. Click on Key Exchange (Phase 2) on the left-sid e of the menu and select Proposal 1. Enter the values to match your configuration of the VPN firewall ModeConfig Record menu.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-33 v1.0, March 2008 T o test the connection: 1. Right-click on the VPN client icon in th e W indows toolbar and select Connect. The connection policy you configured will appear; in this case “M y Connectionsm odecfg_test”.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-34 Virtual Private Ne tworking v1.0, March 2008 2. Click Br owse to locate the trusted certificate on your computer and then click Upload . The certificate will be stored on the router and will display in the T rusted Certificates tabl e.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-35 v1.0, March 2008 • Name – Enter a name that will identify this Certificate. • Subject – This is the name which other organizatio ns will see as the Hol der (owner) of the Certificate.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-36 Virtual Private Ne tworking v1.0, March 2008 . T o submit your Self Certificate request to a CA: 1.
FVS338 ProSafe VPN Firewall 50 Reference Manual Virtual Private Ne tworking 5-37 v1.0, March 2008 When you obtain th e certificate from the CA, you can then upload it to your computer . Click Browse to locate the Certificate file and then click Upload.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 5-38 Virtual Private Ne tworking v1.0, March 2008.
Router and Network Ma nagement 6-1 v1.0, March 2008 Chapter 6 Router and Network Management This chapter describes how to use the network manag eme nt features of your ProSa fe VPN Firewall 50. These features can be found by cli cking on the appropriate heading in the Main Menu of the browser interface.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-2 Router and Network Man a ge m en t v1.0, March 2008 Service Blocking Y ou can control specific outbound traffic (for example., from LAN to W AN). Outbound Services lists all existing rules for outbound traffic.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-3 v1.0, March 2008 See “Using Rules to Block or Allo w Specific Kinds of Traf fic ” on page 4-1 for the procedure on how to use this feature. Services. The Rules menu contains a list of predefined Services for creating firewall rules.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-4 Router and Network Man a ge m en t v1.0, March 2008 Y ou can bypass keyword blocking fo r trusted domains by adding th e exact matching domain to the list of T rusted Domains.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-5 v1.0, March 2008 Y ou can control specific inbound traffic (i .e., from W AN to LAN and from W AN to DMZ). Inbound Services lists all existing rules for inbound traf fic.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-6 Router and Network Man a ge m en t v1.0, March 2008 • Services – Y ou can specify the desired Services or applications to be covered by this rule.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-7 v1.0, March 2008 Using QoS to Shif t the T raffic Mix The QoS priority settings determine the priority and, in turn, the quality of service for t he traffic passing through the firewall.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-8 Router and Network Man a ge m en t v1.0, March 2008 T o modify User or Admin settings: 1. Select Administration from the main menu and Set Password from the submenu. The Set Password screen will display .
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nagement 6-9 v1.0, March 2008 Enabling Remote Management Access Using the Remote Manage ment page, you can allo w an administrator on the In ternet to configure, upgrade, and check the statu s of your VPN firewa ll.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-10 Router and Networ k Management v1.0, March 2008 T o configure your firewall for Remote Management: 1. Select the T urn Remote Management On check box. a. Specify what external addresses will be a llowed to access the firewall’ s remote management.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-11 v1.0, March 2008 2. Specify the Port Number that will be used for accessing the ma nagement interface. W eb browser access normally uses the standard HTTP service port 80.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-12 Router and Networ k Management v1.0, March 2008 3. Specify what external addresses will be allowed to access the firewall’ s remote management. a. T o allow access from any IP addr e ss on the Interne t, select Everyone .
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-13 v1.0, March 2008 • If you want to make the VPN firewall globa lly accessible using the community string, but still receive traps on the host, enter 0.0.0.0 as the Subnet Mask and an IP Address for where the traps will be received.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-14 Router and Networ k Management v1.0, March 2008 Settings Backup and Firmware Upgrade Once you have installed the VPN firewall and have it working p roperly , you should back up a co py of your setting so that it is if something goes wrong.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-15 v1.0, March 2008 Y ou must manually restart the VPN firewall in orde r for the default settings to take effect. After rebooting, the router's password will be password and the LAN IP address will be 192.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-16 Router and Networ k Management v1.0, March 2008 T o upgrade router software: 1. Select Administration from the main menu and Settings Backup & Upgrade from the submenu. The Settings Backup and Firmware Upgrad e screen will display .
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-17 v1.0, March 2008 3. If supported in your region, check the Automatically Adjust for Daylight Savings Time radio box.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-18 Router and Networ k Management v1.0, March 2008 Enabling the T raffic Meter T o monitor traffic limits on eac h of the W AN ports, select Administration from the main menu and T raffic Meter from the submenu.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-19 v1.0, March 2008 Setting Login Failures and Att acks Notification Figure 6-8 shows the Firewall Logs & E-mail screen that is invoked by selecting Monitorin g from the main menu and selecting Firewall Logs & E-mail from the submenu.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-20 Router and Networ k Management v1.0, March 2008 Figure 6-8 Select the types of Enable email alerts.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-21 v1.0, March 2008 V iewing Port T riggering St atus Y ou can view the status of Port Triggering by selecting Security from the main menu and Port T riggering from the submenu.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-22 Router and Networ k Management v1.0, March 2008 V iewing Router Configuration and System S tat us The Router S tatus menu provides status and us age information.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-23 v1.0, March 2008 Monitoring W AN Port s St atus Y ou can monitor the status of both of th e W AN connections, the Dynamic DNS Server connections, and the DHCP Se rver connections.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-24 Router and Networ k Management v1.0, March 2008 . Monitoring VPN T unnel Connection St atus Y ou can view the status of the VPN tunnels by selecting VPN from the main menu and Connection S tatus from the submenu.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-25 v1.0, March 2008 VPN Logs The VPN Logs screen gives log details for recent VPN activity . Select Monitoring from the main menu and VPN Logs from the submenu to view the VPN Logs .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-26 Router and Networ k Management v1.0, March 2008 Performing Diagnostics Y ou can perform diagnostics such as pinging an IP address, performing a DNS lookup, displaying the routing table, rebooti ng the firewall, and capturing packets.
FVS338 ProSafe VPN Firewall 50 Reference Manual Router and Network Ma nageme nt 6-27 v1.0, March 2008 Figure 6-15 T able 6-4. Diagnostics Fields Item Description Ping or T race an IP address Ping – Used to send a ping packet requ es t to a specified IP address—most often, to test a connection.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 6-28 Router and Networ k Management v1.0, March 2008 Reboot the Router Used to perform a remote reboot (restart). Y ou can use this if th e Router seems to have become unstable or is not operating normally .
Troubleshooting 7-1 v1.0, March 2008 Chapter 7 T roubleshooting This chapter provides troubleshooting tips and information for your Pr oSafe VPN Firewall 50. After each problem description, instructions ar e provided to help yo u diagnose and solve the problem.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-2 Troubleshooting v1.0, March 2008 LEDs Never T urn Off When the firewall is turned on, the LEDs turns on for about 10 sec onds and then turn off. If all the LEDs stay on, there is a fault within the firewall.
FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-3 v1.0, March 2008 • Make sure your PC’ s IP address is on the sam e subnet as the firewall. If you are using the recommended addressing sch eme, yo ur PC’ s address should be in the range of 192.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-4 Troubleshooting v1.0, March 2008 T roubleshooting the ISP Connection If your firewall is unable to a ccess the Internet, you should first determine whether the firewall is able to obtain a W AN IP address from the ISP .
FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-5 v1.0, March 2008 – Configu re y our firewall to spoof your PC’ s MAC ad dress. This can be do ne in the Basic Settings menu. Refer to “Configuring your Internet Connection ” on page 2-2 .
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-6 Troubleshooting v1.0, March 2008 If the path is not functioning correctly , you could h ave one of the following problems: • W rong ph ysical connections – Make sure the LAN port LED is on. If the LED is off, follow the instruct ions in “LAN or Internet Port LEDs Not On ” on page 7-2 .
FVS338 ProSafe VPN Firewall 50 Reference Manual Troubleshooting 7-7 v1.0, March 2008 Restoring the Default Co nfiguration and Password This section explains how to restore the fact ory default configuratio n settings, changing the firewall’ s administration password to password and the IP address to 192.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual 7-8 Troubleshooting v1.0, March 2008.
Default Settings and Technical Specifications A-1 v1.0, March 2008 Appendix A Default Settings and T echnical S pecifications Y ou can use the reset button located on the front of your device to reset all settings to their factory defaults. This is called a hard reset.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual A-2 Default Settings and Technical Specifications v1.0, March 2008 T echnical Specifications for the ProSafe VPN Firewall 50 are listed in the following table.
FVS338 ProSafe VPN Firewall 50 Reference Manual Default Settings and Technical Specifications A-3 v1.0, March 2008 Environmental S pecifications Operating temperature: 0 ° to 40 ° C (32º to 104º F.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual A-4 Default Settings and Technical Specifications v1.0, March 2008.
System Logs and Error Messa ge s B-1 v1.0, March 2008 Appendix B System Logs and Error Messages This appendix uses the fo llowing log parameter terms. System Log Messages This section describes log messages that be long to one of the following categories: • Logs generated by traffic that is meant for the device.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-2 System Logs and Erro r Messages v1.0, March 2008 Reboot This section describes log messages generated during system reboot. NTP This section describes log messages generated by the NTP daemon during synchronization with the NTP server .
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-3 v1.0, March 2008 Login/Logout This section describes logs ge nerated by the administrativ e interfaces of the device. Firewall Rest art This logging is always done. T able B-4.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-4 System Logs and Erro r Messages v1.0, March 2008 IPSec Rest art This logging is always done. W AN S t atus This section describes the logs generated by th e W AN component.
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-5 v1.0, March 2008 Auto Rollover When W AN mode is configured to Auto Rollover , primary link is active and secondary acts as a backup. When primary link goes down, secondary becomes active until primary comes up.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-6 System Logs and Erro r Messages v1.0, March 2008 PPP Logs This section describes the W AN PPP connection logs.
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-7 v1.0, March 2008 PPPoE Idle-Timeout Logs. T able B-9. System Logs: W A N St atus, PPE, PPPoE Idle-Timeout Message No.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-8 System Logs and Erro r Messages v1.0, March 2008 PPTP Idle-T imeout Logs. PPP Authentication Logs. We b Filtering and Content Filtering Logs T o enable web keyword filtering logs, set value of keywordLog to 1 from CLI.
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-9 v1.0, March 2008 T able B-12. System Logs: W eb Filtering and Content Filtering Message Jan 23 16:36:35 [FVS338] [ker nel] [KEYWORD_BL OCKED] [URL]==>[ www .redhat.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-10 System Logs and Error Messages v1.0, March 2008 T raffic Metering Logs Unicast Logs ICMP Redirect Logs T able B-13. System Logs : T raffic Metering Message Jan 23 19:03:44 [TRAFFIC_METER] TRAFFIC_METER: Monthly Limit o f 10 MB has reached for W AN1.
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-11 v1.0, March 2008 Multicast/Broadcas t Logs FTP Logging Invalid Packet Logging T able B-16. System Logs : Mult icast/Broadcast Message Jan 1 07:24:13 [FVS338] [kernel] MCAST -BCAST IN=W AN OUT=SELF SRC=192.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-12 System Logs and Error Messages v1.0, March 2008 Recommended Action 1. Invalid packets are dropped.
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-13 v1.0, March 2008 Recommended Action 1. Invalid packets are dropped.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-14 System Logs and Error Messages v1.0, March 2008 Routing Logs This section is used to configure the logging options for each network segment lik e LAN-W AN for debugging purposes. This may generate a significant volume of log messages.
FVS338 ProSafe VPN Firewall 50 Reference Manual System Logs and Error Message s B-15 v1.0, March 2008 LAN to W AN Logs LAN to DMZ Logs DMZ to W AN Logs W AN to LAN Logs T able B-19. Routing Logs: LAN to W AN Message Nov 29 09:19:43 [FVS338] [kernel ] LAN2WAN[ACCEP T] IN=LAN OUT=W AN SRC=192.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual B-16 System Logs and Error Messages v1.0, March 2008 DMZ to LAN Logs W AN to DMZ Logs T able B-23. Routing Logs: DMZ to W AN Message Nov 29 09:44:06 [FVS338] [ker nel] DMZ2LAN[DROP] IN=DMZ OUT=LAN SRC=192.
Related Documents C-1 v1.0, March 2008 Appendix C Related Document s This appendix provides links to reference documents you c an use to gain a more com ple te understanding of the technolog ies used in your NETGEAR prod uct. Document Link Internet Netw orking and TCP/IP Addressing: http://documenta tion.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual C-2 Related Documents v1.0, March 2008.
Index-1 v1.0, March 2008 Index A Add LAN W AN Inbound Service scr een 4-9 , 4-15 Add LAN W AN Outbound Service screen 4-8 address reservation 3-10 AH VPN Policies, use with 5-7 ARP 3-6 Attack Checks B.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-2 v1.0, March 2008 D date troubleshooting 7-7 Daylight Savings T ime setting 6-17 Dead Peer Detectio n 5-5 default configuration restoring 7-7 d.
FVS338 ProSafe VPN Firewall 50 Reference Manual Index-3 v1.0, March 2008 technical specification s A-1 firewall access remote management 6- 9 Firewall Logs configuring 4-34 emailing of 4-32 Firewall L.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-4 v1.0, March 2008 examples of 4-23 L L2TP VPN T unnel 4-1 1 LAN configuration 3-1 ports and attached devices 6-25 LAN Security Checks UDP flood.
FVS338 ProSafe VPN Firewall 50 Reference Manual Index-5 v1.0, March 2008 P package contents 1-4 Packet Trace 6-28 Passwords changing 6-7 restoring 7-7 performance management 6- 1 Ping T roubleshooting.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-6 v1.0, March 2008 blocking traffic 4-1 service blocking 4-2 services-based 4-2 S Schedule blocking traffic 4-21 rules, covered by 6-2 Schedule .
FVS338 ProSafe VPN Firewall 50 Reference Manual Index-7 v1.0, March 2008 LEDs Never T urn Off 7-2 NTP 7-7 Power LED Not On 7-1 W eb configuration 7-2 T rusted Certificates 5-33 about 5-3 3 U UDP flood.
FVS338 ProSafe VPN Firewall 50 Re fe rence Manual Index-8 v1.0, March 2008.
Een belangrijk punt na aankoop van elk apparaat NETGEAR FVS338 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen NETGEAR FVS338 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens NETGEAR FVS338 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding NETGEAR FVS338 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over NETGEAR FVS338 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van NETGEAR FVS338 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de NETGEAR FVS338 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met NETGEAR FVS338 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.