NETGEAR FVL328 Reference Manual page 7

Prosafe high-speed vpn firewall
Hide thumbs Also See for FVL328:
Table of Contents

Advertisement

Using Firewall Rules to Regulate Network Traffic ..........................................................5-5
Rules Menu Options .................................................................................................5-6
Using Inbound Rules (Port Forwarding) ...................................................................5-7
Inbound Rule Example: A Local Public Web Server ..........................................5-7
Considerations for Inbound Rules .....................................................................5-9
Using Outbound Rules (Service Blocking) .............................................................5-10
Outbound Rule Example: Blocking Instant Messenger ...................................5-10
Understanding the Order of Precedence for Rules ................................................5-12
Regulating Access to Network Services .......................................................................5-12
How to Define Services ..........................................................................................5-13
Setting Times and Scheduling Firewall Services ..........................................................5-14
How to Set Your Time Zone ...................................................................................5-14
How to Schedule Firewall Services ........................................................................5-16
Chapter 6
Overview of FVL328 Policy-Based VPN Configuration ..................................................6-1
Using Policies to Manage VPN Traffic .....................................................................6-1
Using Automatic Key Management ..........................................................................6-2
VPN Policy Configuration for Auto Key Negotiation .................................................6-6
VPN Policy Configuration for Manual Key Exchange ...............................................6-9
Using Digital Certificates for IKE Auto-Policy Authentication .......................................6-14
Certificate Revocation List (CRL) ...........................................................................6-14
Walk-Through of Configuration Scenarios ....................................................................6-15
How to Check VPN Connections ...........................................................................6-21
FVL328 Scenario 2: Authenticating with RSA Certificates .....................................6-22
Chapter 7
Network Management ....................................................................................................7-1
How to Configure Remote Management ..................................................................7-1
Viewing Router Status and Usage Statistics ............................................................7-3
Viewing Attached Devices ........................................................................................7-5
Contents
M-10144-01
iii

Advertisement

Table of Contents
loading

Table of Contents