A Powerful, True Firewall With Content Filtering - NETGEAR FVS318G - ProSafe Gigabit VPN Firewall Data Sheet Router Reference Manual

Prosafe gigabit 8 port vpn firewall
Hide thumbs Also See for FVS318G - ProSafe Gigabit VPN Firewall Data Sheet Router:
Table of Contents

Advertisement

ProSafe Gigabit 8 Port VPN Firewall FVS318G Reference Manual
Built-in eight-port 10/100/1000 Mbps Gigabit Ethernet LAN switch for extremely fast data
transfer between local network resources..
10/100/1000 Mbps Gigabit Ethernet WAN port for connection to a WAN device, such as a
cable modem or DSL modem.
Advanced IPsec VPN support.
Advanced stateful packet inspection (SPI) firewall with multi-NAT support.Login capability.
Front panel LEDs for easy monitoring of status and activity.
Flash memory for firmware upgrade.
Advanced VPN Support for IPsec
The VPN firewall supports IPsec virtual private network (VPN) connections.
IPsec VPN delivers full network access between a central office and branch offices, or between a
central office and telecommuters. Remote access by telecommuters requires the installation of
VPN client software on the remote computer.
IPsec VPN with broad protocol support for secure connection to other IPsec gateways and
clients.
Bundled with the single-user license of the NETGEAR ProSafe VPN Client software
(VPN01L)
Supports 5 concurrent IPsec VPN tunnels.

A Powerful, True Firewall with Content Filtering

Unlike simple Internet sharing NAT routers, the FVS318G is a true firewall, using stateful packet
inspection (SPI) to defend against hacker attacks. Its firewall features include:
Automatically detects and thwarts denial of service (DoS) attacks such as Ping of Death and
SYN Flood.
Blocks unwanted traffic from the Internet to your LAN.
Blocks access from your LAN to Internet locations or services that you specify as off-limits.
Prevents objectionable content from reaching your PCs. You can control access to Internet
content by screening for Web services, Web addresses, and keywords within Web addresses.
You can configure the firewall to log and report attempts to access objectionable Internet sites.
Permits scheduling of firewall policies by day and time.
1-2
1.1 November, 2009
Introduction

Advertisement

Table of Contents
loading

Table of Contents