Page 1
Reference Manual for the ProSafe VPN Firewall 50 FVS338 NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 202-10046-01 Version 1.0 January 2005 January 2005...
Page 2
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
Page 3
Certificate of the Manufacturer/Importer It is hereby certified that the FVS338 ProSafe VPN Firewall 50 has been suppressed in accordance with the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some equipment (for example, test transmitters) in accordance with the regulations may, however, be subject to certain restrictions.
Page 4
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Open SSL Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions * are met: 1.
Page 5
Copyright (C) 1990, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.
Page 6
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Product and Publication Details Model Number: Publication Date: Product Family: Product Name: Home or Business Product: Language: FVS338 January 2005 Router FVS338 ProSafe VPN Firewall 50 Business English January 2005...
Easy Installation and Management ...2-4 Maintenance and Support ...2-5 Package Contents ...2-5 The Router’s Front Panel ...2-6 The Router’s Rear Panel ...2-7 The Router’s IP Address, Login Name, and Password ...2-8 Default Factory Settings ...2-9 NETGEAR Related Products ...2-9 Chapter 3 Network Planning Overview of the Planning Process ...3-1...
Page 8
VPN Gateway-to-Gateway: Single Gateway WAN Ports (Reference Case) ...3-8 VPN Gateway-to-Gateway: Dual Gateway WAN Ports for Improved System Reliability VPN Telecommuter (Client-to-Gateway Through a NAT Router) ...3-10 VPN Telecommuter: Single Gateway WAN Port (Reference Case) ... 3-11 VPN Telecommuter: Dual Gateway WAN Ports for Improved System Reliability 3-11...
Page 9
Configure the WAN Options (If Needed) ...4-18 Chapter 5 Serial Port Configuration Configuring a Serial Port Modem ...5-1 Basic Requirements for Serial Port Modem Configuration ...5-1 How to Configure a Serial Port Modem ...5-2 Configuring Auto-Rollover ...5-3 Basic Requirements for Auto-Rollover ...5-3 How to Configure Auto-Rollover ...5-3 Chapter 6 LAN Configuration...
Page 10
Creating a VPN Connection: Between FVX538 and FVS338 ...8-1 Configuring the FVX538 ...8-2 Configuring the FVS338 ...8-6 Testing the Connection ...8-8 Creating a VPN Connection: Netgear VPN Client to FVS338 ...8-8 Configuring the FVS338 ...8-9 Configuring the VPN Client ...8-9 Testing the Connection ...8-17...
Page 11
Traffic Limits Reached ... 9-11 Login Failures and Attacks ...9-12 Monitoring ...9-14 Viewing VPN Firewall Status and Time Information ...9-14 Firewall Status ...9-14 Time Information ...9-16 WAN Ports ...9-18 WAN Port Connection Status ...9-18 Dynamic DNS Status ...9-19 Internet Traffic Information ...9-19 LAN Ports and Attached Devices ...9-20 Known PCs and Devices ...9-20 DHCP Log ...9-22...
Page 12
Appendix B Network, Routing, Firewall, and Basics Related Publications ... B-1 Basic Router Concepts ... B-1 What is a Router? ... B-2 Routing Information Protocol ... B-2 IP Addresses and the Internet ... B-2 Netmask ... B-4 Subnet Addressing ... B-5 Private IP Addresses ...
Page 13
Enabling DHCP to Automatically Configure TCP/IP Settings ... C-8 DHCP Configuration of TCP/IP in Windows XP ... C-8 DHCP Configuration of TCP/IP in Windows 2000 ... C-10 DHCP Configuration of TCP/IP in Windows NT4 ... C-13 Verifying TCP/IP Properties for Windows XP, 2000, and NT4 ... C-15 Configuring the Macintosh for TCP/IP Networking ...
Page 14
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Testing and Troubleshooting ... D-11 Additional Reading ... D-11 Glossary List of Glossary Terms ...Glossary-1 Numeric ...Glossary-1 A ...Glossary-2 B ...Glossary-2 C ...Glossary-3 D ...Glossary-3 E ...Glossary-4 G ...Glossary-5 I ...Glossary-5 L ...Glossary-7 M ...Glossary-7 P ...Glossary-8...
This manual is written for the FVS338 VPN firewall according to these specifications.: Table 1-2. Manual Scope Product Version Manual Publication Date Note: Product updates are available on the NETGEAR, Inc. Web site at http://kbserver.netgear.com/products/FVS338.asp. About This Manual About This Manual FVS338 ProSafe VPN Firewall 50...
• button to access the full NETGEAR, Inc. online knowledge base for the product model. • Links to PDF versions of the full manual and individual chapters.
How to Print this Manual To print this manual you can choose one of the following several options, according to your needs. • Printing a Page in the HTML View. Each page in the HTML version of the manual is dedicated to a major topic. Use the Print button on the browser toolbar to print the page contents.
Page 18
Reference Manual for the ProSafe VPN Firewall 50 FVS338 About This Manual January 2005...
This chapter describes the features of the NETGEAR FVS338 ProSafe VPN Firewall 50. Key Features of the VPN Firewall The FVS338 ProSafe VPN Firewall 50 with 8 port switch connects your local area network (LAN) to the Internet through an external access device such as a cable modem or DSL modem.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • SNMP for manageability. • Front panel LEDs for easy monitoring of status and activity. • Flash memory for firmware upgrade. Full Routing on Both the Broadband and Serial WAN Ports You can install, configure, and operate the FVS338 to take full advantage of a variety of routing options on both the serial and broadband WAN ports, including: •...
Security The FVS338 VPN firewall is equipped with several features designed to maintain security, as described in this section. • PCs Hidden by NAT NAT opens a temporary path to the Internet for requests originating from the local network. Requests originating from outside the LAN are discarded, preventing users outside the LAN from finding and directly accessing the PCs on the LAN.
• VPN Wizard The FVS338 VPN firewall includes the NETGEAR VPN Wizard to easily configure VPN tunnels according to the recommendations of the Virtual Private Network Consortium (VPNC) to ensure the VPN tunnels are interoperable with other VPNC-compliant VPN routers and clients.
The FVS338 VPN firewall’s front panel LEDs provide an easy way to monitor its status and activity. Maintenance and Support NETGEAR offers the following features to help you maximize your use of the FVS338 VPN firewall: • Flash memory for firmware upgrade •...
• Warranty and Support Information Card. If any of the parts are incorrect, missing, or damaged, contact your NETGEAR dealer. Keep the carton, including the original packing materials, in case you need to return the firewall for repair. Router’s Front Panel The FVS338 ProSafe VPN Firewall 50 front panel shown below contains the status LEDs.
Local LEDs Link/Act LED On (Green) Blinking (Green) 100 LED On (Green) The Router’s Rear Panel The rear panel of the FVS338 ProSafe VPN Firewall 50 connections, modem connector, factory defaults button, On/Off switch, and DC power connection. MODEM FACTORY DEFAULTS...
• On/Off switch • DC power in (12 VDC, 1.2A) The Router’s IP Address, Login Name, and Password Check the label on the bottom of the FVS338’s enclosure if you forget the following factory default information: • IP Address: http://192.168.1.1 to reach the Web-based GUI from the LAN •...
Password (case sensitive) Built-in DHCP server IP Configuration Time Zone Adjust for Daylight Saving TIme NETGEAR Related Products NETGEAR products related to the FVS338 ProSafe VPN Firewall 50 are as follows: • FA311 10/100 PCI Adapter • FA511 10/100 32-bit CardBus Adapter •...
Page 28
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • VPN01L and VPN05L ProSafe VPN Client Software • WG302 ProSafe 802.11g Access Point 2-10 January 2005 Introduction...
A virtual private network (VPN) tunnel provides a secure communication channel between either two gateway VPN routers or between a remote PC client and gateway VPN router. As a result, the IP address of at least one of the tunnel end points must be known in advance in order for the other tunnel end point to establish (or re-establish) the VPN tunnel.
Rules menu. Instead of discarding this traffic, you can have it forwarded to one or more LAN hosts on your network. These LAN hosts are called exposed hosts. The addressing of the router’s dual WAN port depends on the configuration being implemented:...
PSTN service so that the failover to a serial connection would be as seamless as possible. Single Exposed Host The Internet IP address of the router’s WAN port must be public so that the public can send incoming traffic to the exposed host when this feature is supported and enabled.
Figure 3-3: Dual WAN port case with exposed host, before and after failover Multiple Exposed Hosts The IP address range of the router’s WAN port must be both fixed and public so that the public can send incoming traffic to the multiple exposed hosts when this feature is supported and enabled.
Virtual Private Networks (VPNs) When implementing virtual private network (VPN) tunnels, a mechanism must be used for determining the IP addresses of the tunnel end points. The addressing of the router’s dual WAN port depends on the configuration being implemented: Table 3-1.
IP address of active WAN port changes after a failover (use of fully-qualified domain names always required) Figure 3-5: Dual gateway WAN ports before and after failover VPN Road Warrior (Client-to-Gateway) The following situations exemplify the requirements for a remote PC client with no router to establish a VPN tunnel with a gateway VPN router: •...
VPN Road Warrior: Dual Gateway WAN Ports for Improved System Reliability In the case of the dual WAN ports on the gateway VPN router initiates the VPN tunnel with the active gateway WAN port (port WAN1 in this example) because the IP address of the remote PC client is not known in advance.
The purpose of the fully-qualified domain name is this case is to toggle the domain name of the gateway router between the IP addresses of the active WAN port (i.e., WAN1 and WAN2) so that the remote PC client can determine the gateway IP address to establish or re-establish a VPN tunnel.
Page 37
VPN Gateway-to-Gateway: Dual Gateway WAN Ports for Improved System Reliability In the case of the dual WAN ports on the gateway VPN router WAN ports at one end can initiate the VPN tunnel with the appropriate gateway WAN port at the other end as necessary to balance the loads of the gateway WAN ports because the IP addresses of the WAN ports are known in advance.
NAT router for budgetary reasons. The following situations exemplify the requirements for a remote PC client connected to the Internet with a dynamic IP address through a NAT router to establish a VPN tunnel with a gateway VPN router at the company office: •...
In the case of the single WAN port on the gateway VPN router at the NAT router initiates the VPN tunnel because the IP address of the remote NAT router is not known in advance. The gateway WAN port must act as the responder.
Page 40
The purpose of the fully-qualified domain name is this case is to toggle the domain name of the gateway router between the IP addresses of the active WAN port (i.e., WAN1 and WAN2) so that the remote PC client can determine the gateway IP address to establish or re-establish a VPN tunnel.
Connecting the FVS338 to the Internet This chapter describes how to set up the firewall on your Local Area Network (LAN) and connect to the Internet. You can perform basic configuration of your FVS338 ProSafe VPN Firewall 50 using the Setup Wizard, or manually configure your Internet connection. What You Will Need Before You Begin You need to prepare these three things before you can connect your VPN firewall to the Internet: A computer properly connected to the VPN firewall as explained below.
For Macintosh computers, open the TCP/IP or Network control panel. • You may also refer to the FVS338 Resource CD for the NETGEAR Router ISP Guide which provides Internet connection information for many ISPs. Once you locate your Internet configuration parameters, you may want to record them on the page below according to the instructions in Information”...
Worksheet for Recording Your Internet Connection Information Print this page. Fill in the configuration parameters from your Internet Service Provider (ISP). ISP Login Name: The login name and password are case sensitive and must be entered exactly as given by your ISP. Some ISPs use your full e-mail address as the login name. The Service Name is not required by all ISPs.
Connect the Ethernet cable (B) which came with the VPN firewall from a Local port on the router to your computer. Note: The FVS338 VPN firewall incorporates Auto Uplink port will automatically sense whether the cable plugged into the port should have a 'normal' connection (e.g.
Page 45
2. Log in to the FVS338. Note: To connect to the VPN firewall, your computer needs to be configured to obtain an IP address automatically via DHCP. Please refer to for instructions on how to do this. Turn on the VPN firewall and wait for the TEST light to stop blinking. Now, turn on your computer.
Page 46
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Connect to the Internet. Figure 4-1: Setup Wizard You are now connected to the VPN firewall. If you do not see the menu above, click the Setup Wizard link on the upper left of the main menu. Choose NAT or Classical Routing.
Perform a DNS Lookup. A DNS (Domain Name Server) converts the Internet name (e.g. www.netgear.com) to an IP address. If you need the IP address of a Web, FTP, Mail or other Server on the Internet, you can do a DNS lookup to find the IP address.
Address to manually type in the MAC address that your ISP expects. Click Apply to save your settings. Click the Test button to test your Internet connection. If the NETGEAR Web site does not appear within one minute, refer to...
MAC address. Click Apply to save your settings. Click the Test button to test your Internet connection. If the NETGEAR Web site does not appear within one minute, refer to Configuring for a Wizard-Detected Fixed IP (Static) Account If the Setup Wizard determines that your Internet service account uses Fixed IP assignment, you will be directed to the correct setup menu.
Page 50
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Configure the firewall Connect to the Internet Follow the steps below to configure a serial port Internet connection on your firewall. Connect the Firewall to your dial-up modem Turn off your modem and connect the cable from the serial port of the FVS338 to the modem.
Page 51
Figure 4-2: Serial Internet Connection configuration menu Fill in the analog ISP Internet configuration parameters as appropriate: • For a Dial-up Account, enter the Account information. Check “Connect as required” to enable the firewall to automatically dial the number. To enable Idle Time disconnect, check the box and enter a time in minutes.
Page 52
PC configuration and pasting them into the FVS338 Modem Properties Initial String field. For more information on this procedure, please refer to the support area of the NETGEAR web site. • Select the Serial Line Speed. This is the maximum speed the modem will attempt to use.
After completing the Internet connection configuration, your can test your Internet connection. Log in to the VPN firewall, then, from the Setup Basic Settings link, click the Test button. If the NETGEAR Web site does not appear within one minute, refer to Chapter 10, “Troubleshooting.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Manually Configuring Your Internet Connection You can manually configure your firewall using the menu below, or you can allow the Setup Wizard to determine your configuration as described in the previous section. ISP Does Not Require Login ISP Does Require Login Figure 4-3: Browser-based configuration Basic Settings menu...
Note: A DNS server is a host on the Internet that translates Internet names (such as www.netgear.com) to numeric IP addresses. Typically your ISP transfers the IP address of one or two DNS servers to your firewall during login. If the ISP does not transfer an address, you must obtain it from the ISP and enter it manually here.
PC that you are now using. You must be using the one PC that is allowed by the ISP. Or, select “Use this MAC address” and enter it. Click Apply to save your settings. Click Test to test your Internet connection. If the NETGEAR Web site does not appear within one minute, refer to Chapter 10,...
Page 57
Figure 4-4: Dynamic DNS screens Each DNS service provider requires its own parameters DynDNS Service Screen Figure 4-5: Dynamic DNS service provider screens Access the website of one of the dynamic DNS service providers whose names appear in the ‘Select Service Provider’ box, and register for an account. For example, for dyndns.org, go to www.dyndns.org.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Type the entire FQDN name that your dynamic DNS service provider gave you, such as myName.dyndns.org. Type the user name for logging into your dynamic DNS account. Type the password (or key) for your dynamic DNS account. If your dynamic DNS provider allows the use of wildcards in resolving your URL, you may select the Use wildcards check box to activate this feature.
Page 59
Edit the default information you want to change. • Respond To Ping On Internet Port—If you want the router to respond to a 'Ping' from the Internet, click this check box. This can be used as a diagnostic tool. You shouldn't check this box unless you have a specific reason to do so.
Page 60
Reference Manual for the ProSafe VPN Firewall 50 FVS338 4-20 Connecting the FVS338 to the Internet January 2005...
This chapter describes how to configure the serial port options of your FVS338 ProSafe VPN Firewall 50. The FVS338 serial port lets you share the broadband connection of another FVS338, share resources between two LANs, and take advantage of the routing functions on the broadband (WAN), LAN, and serial network interfaces.
PC, establishing a connection to your ISP, and then copying the modem string settings from the PC configuration and pasting them into the FVS338 modem configuration fields. For more information on this procedure, please refer to the support area of the NETGEAR web site.
Configuring Auto-Rollover You can configure the serial port of the FVS338 to provide an auto-rollover backup connection for your broadband service. Be sure you have prepared the basic requirements listed below, then follow the ‘how to’ procedure. Basic Requirements for Auto-Rollover Auto-Rollover requires these elements: A broadband connection to the FVS338.
Page 64
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Figure 5-2: Auto-Rollover configuration menu Configure the Auto-Rollover settings. Click Apply for the changes to take effect. January 2005 Serial Port Configuration...
This chapter describes how to configure the advanced features of your FVS338 ProSafe VPN Firewall 50. These features can be found under the Advanced heading in the Main Menu of the browser interface. • LAN Setup • DMZ Setup • Static Routes Using the LAN IP Setup Options The LAN IP Setup menu allows configuration of LAN IP services such as DHCP and RIP.
RIP is applicable if your network contains multiple routers. • IP Address: Type the IP address of your router (factory default: 192.168.1.1). Make sure that LAN Port IP address and DMZ port IP address are in different subnets. Filtering.
Page 67
Configuration Protocol) server, providing TCP/IP configuration for all computers connected to the router's LAN. If another device on your network will be the DHCP server, or if you will manually configure all devices, select the Disable option under DHCP configuration. Select the DHCP Relay option to configure the router as a DHCP relay.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • Ending IP Address - This box specifies the last of the contiguous addresses in the IP address pool. 192.168.1.254 is the default ending address. • WINS Server - This box can specify the Windows NetBios Server IP if one is present in your network.
• Primary DNS Server (if you entered a Primary DNS address in the Basic Settings menu; otherwise, the firewall’s LAN IP address) • Secondary DNS Server (if you entered a Secondary DNS address in the Basic Settings menu) • WINS Server (if you entered a Secondary DNS address in the Basic Settings menu) Using Address Reservation When you specify a reserved IP address for a PC on the LAN, that PC will always receive the same IP address each time it access the firewall’s DHCP server.
Internet for services that you haven't defined. There are security issues with doing this, so only do this if you're willing to risk open access. If you do not assign an exposed host, the router discards any incoming service requests that are undefined.
Instead of discarding this traffic, you can have it forwarded to one computer on your network. This computer is called the exposed host. Note: For security, NETGEAR strongly recommends that you avoid using the exposed host feature. When a computer is designated as the exposed host, it loses much of the protection of the firewall and is exposed to many exploits from the Internet.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 From the Main Menu of the browser interface, under Advanced, click on DMZ Setup to view the DMZ Setup menu, shown below. Figure 6-4: DMZ Setup screen (exposed host setup) To assign a computer or server to be a exposed host: Click Default DMZ Server.
Page 73
IP address in the Destination Field of the inbound rule. Note: For security, NETGEAR strongly recommends that you avoid using the one-to-one NAT mapping feature. When a computer is designated as the destination of one-to-one NAT mapping, it loses much of the protection of the firewall and is exposed to many exploits from the Internet.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Click Apply. Note: All incoming traffic to that IP address will be sent to the selected PC. Out-going traffic from the selected PC will use the IP address you entered, not the default WAN IP address. No firewall protection is available.
Page 75
To add or edit a Static Route: Click the Add button to open the Add/Edit Menu, shown below. Type a route name for this static route in the Route Name box under the table. (This is for identification purpose only.) Select Private if you want to limit access to the LAN only.
Page 76
Reference Manual for the ProSafe VPN Firewall 50 FVS338 6-12 LAN Configuration January 2005...
You can also block Internet access by applications and services, such as chat or games. A firewall is a special category of router that protects one network (the “trusted” network, such as your LAN) from another (the “untrusted” network, such as the Internet), while allowing communication between the two.
Page 78
Reference Manual for the ProSafe VPN Firewall 50 FVS338 A firewall has two default rules, one for inbound traffic and one for outbound. The default rules of the FVS338 are: • Inbound: Block all access from outside except responses to requests from the LAN side. •...
Page 79
Outbound Services—This lists all existing rules for outbound traffic. If you have not defined any rules, only the default rule will be listed. The default rule allows all outgoing traffic. • To create a new outbound service rule: Click the Add button. It does not matter which radio button is selected. The Outbound Service screen will be displayed (see on page 7-9).
UDP Flooding: Enable this to limit the number of UDP sessions created from one LAN machine. • TCP Flooding: Enable this to protect the router from Syn flood attack. • Enable DNS Proxy: Enable this to allow the incoming DNS queries.
Inbound Rules (Port Forwarding) Because the FVS338 uses Network Address Translation (NAT), your network presents only one IP address to the Internet and outside users cannot directly address any of your local computers. However, by defining an inbound rule you can make a local server (for example, a web server or game server) visible and available to the Internet.
Page 82
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Table 7-1. Inbound Services Item Description Services Select the desired Service or application to be covered by this rule. If the desired service or application does not appear in the list, you must define it using the Services menu (see Action Select the desired action for packets covered by this rule:...
Note: Some residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Inbound Rule Example: Allowing Videoconference from Restricted Addresses If you want to allow incoming videoconferencing to be initiated from a restricted range of outside IP addresses, such as from a branch office, you can create an inbound rule. In the example shown Figure 7-4, CU-SeeMe connections are allowed only from a specified range of external IP addresses.
• Local PCs must access the local server using the PCs’ local LAN address (192.168.0.99 in this example). Attempts by local PCs to access the server using the external WAN IP address will fail. Outbound Rules (Service Blocking) The FVS338 allows you to block the use of certain Internet services by PCs on your network. This is called service blocking or port filtering.
Page 86
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Table 7-2. Outbound Services Item Description Services Select the desired Service or application to be covered by this rule. If the desired service or application does not appear in the list, you must define it using the Services menu (see Action Select the desired action for outgoing connections covered by this rule:...
Table 7-2. Outbound Services Item Description This determines whether packets covered by this rule are logged. Select the desired action: • Always - always log traffic considered by this rule, whether it matches or not. This is useful when debugging your rules. •...
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Order of Precedence for Rules As you define new rules, they are added to the tables in the Rules menu, as shown in Figure 7-7: Figure 7-7: Rules table with examples For any traffic attempting to pass through the firewall, the packet information is subjected to the rules in the order shown in the Rules Table, beginning at the top and proceeding to the default rules at the bottom.
Page 89
Although the FVS338 already holds a list of many service port numbers, you are not limited to these choices. Use the Services menu to add additional services and applications to the list for use in defining firewall rules. The Services menu shows a list of services that you have defined, as shown in Figure 7-8:...
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Click Apply. The new service will now appear in the Services menu, and in the Service name selection box in the Rules menu. Quality of Service (QoS) Priorities This setting determines the priority of a service, which in turn, determines the quality of that service for the traffic passing through the firewall.
Page 91
Example 1 (priority unchanged): If the native ToS setting for a service is 3 and the Netgear QoS setting for this service is None, then the traffic for this service is placed in the queue that handles priority 3 traffic.
PCs and devices become known by the following methods: • DHCP Client Requests—By default, the DHCP server in this Router is enabled, and will accept and respond to DHCP client requests from PCs and other network devices. These requests also generate an entry in the Network Database. Because of this, leaving the DHCP Server feature (on the LAN screen) enabled is strongly recommended.
Page 93
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Figure 7-10: Groups and Hosts screens Firewall Protection and Content Filtering 7-17 January 2005...
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Table 7-4. Groups and hosts Item Description Known PCs and This table lists all current entries in the Network Database. For each PC or device, Devices the following data is displayed. •...
Page 95
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Figure 7-11: Schedule menu To invoke rules and block keywords or Internet domains based on a schedule, select Every Day or select one or more days. If you want to limit access completely for the selected days, select All Day.
VPN firewall's content and Web component filtering feature. By default, this feature is disabled; all requested traffic from any Web site is allowed. When users try to access a blocked site, they will get a message: Blocked by NETGEAR. •...
Page 97
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Figure 7-12: Block Sites menu Firewall Protection and Content Filtering 7-21 January 2005...
Page 98
• In the Trusted Domains box, enter the exact matching domain name for which the keyword filtering will be bypassed. Example: Enter www.netgear.com to bypass URL keyword filtering for this domain. The domains in this list will be allowed without any filtering, web component filtering still applies.
Source MAC Filtering Source MAC Filter will drop the Internet-bound traffic received from the PCs with the specified MAC address. • By default, the source MAC address filter is disabled. All the traffic received from PCs with any MAC address is allowed by default. •...
• This Router matches the response to the previous request, and forwards the response to the PC. Without Port Triggering, this response would be treated as a new connection request rather than a response. As such, it would be handled in accordance with the Port Forwarding rules.
Page 101
• After a PC has finished using a Port Triggering application, there is a Time-out period before the application can be used by another PC. This is required because this Router cannot be sure when the application has terminated. Note: For additional ways of allowing inbound traffic, see Forwarding)”...
Getting E-Mail Notifications of Event Logs and Alerts Your router will log security-related events such as denied incoming service requests, hacker probes, and administrator logins, according to your settings on this screen. If you have set up content filtering on the Block Sites page (see can also log when someone on your network tried to access a blocked site.
Page 103
Figure 7-15: Logs and E-mail screens Click on View Log button to view various log messages generated by the Router. • In view log window To delete all log entries: Click Clear Log. • To see the most recent entries: Click Refresh.
Page 104
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Items to include in the log: • Use these checkboxes to determine which events are included in the log. Selecting all events will increase the size of the log, so it is good practice to disable any events which are not really required.
• In the Log Threshold Time box, set the logs Threshold time. • In the Alert Queue Length box, set the alerts queue length. Click Apply to have your changes take effect. Syslog You can configure the firewall to send system logs to an external PC that is running a syslog logging program.
Page 106
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Figure 7-16: Firewall Logs menu Table 7-8. Log entry descriptions Field Description Date and Time The date and time the log entry was recorded. Description or The type of event and what action was taken if any. Action Source IP The IP address of the initiating device for this log entry.
Table 7-8. Log entry descriptions Field Description Source port and The service port number of the initiating device, and whether it originated interface from the LAN or WAN Destination The name or IP address of the destination device or website. Destination port and The service port number of the destination device, and whether it’s on the interface...
Page 108
Reference Manual for the ProSafe VPN Firewall 50 FVS338 7-32 Firewall Protection and Content Filtering January 2005...
Dynamic DNS service. Creating a VPN Connection: Between FVX538 and FVS338 This section describes how to configure a VPN connection between a NETGEAR FVX538 VPN Firewall and a NETGEAR FVS338 VPN Firewall. Using each firewall's VPN Wizard, we will create a set of policies (IKE and VPN) that will allow the two firewalls to connect from locations with fixed IP addresses.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Configuring the FVX538 Select the VPN Wizard Give the client connection a name, such as to_fvs. Enter a value for the pre-shared key. Select 'a remote VPN gateway'. Figure 8-1: VPN Wizard start page Click Next.
Page 111
Enter the LAN IP address and subnet mask of the remote FVS338. Figure 8-3: LAN IP address and subnet mask of remote FVX538 Click Next. Click Done to create the 'to_fvs' IKE and VPN policies. In the IKE Policies menu, the 'to_fvs' IKE policy will appear in the table. Figure 8-4: IKE Policies Virtual Private Networking Reference Manual for the ProSafe VPN Firewall 50 FVS338...
Page 112
Reference Manual for the ProSafe VPN Firewall 50 FVS338 You can view the IKE parameters by selecting 'to_fvs' and clicking Edit. It should not be necessary to make any changes. Figure 8-5: FVX538-to-FVS338 IKE screen Virtual Private Networking January 2005...
Page 113
Reference Manual for the ProSafe VPN Firewall 50 FVS338 In the VPN Policies menu, the 'to_fvs' VPN policy will appear in the table. Figure 8-6: FVX538 VPN Policies screen Virtual Private Networking January 2005...
Reference Manual for the ProSafe VPN Firewall 50 FVS338 You can view the VPN parameters by selecting 'to_fvs' and clicking Edit. It should not be necessary to make any changes. Figure 8-7: FVX538-to-FVS338 VPN screen Configuring the FVS338 Select the VPN Wizard Give the client connection a name, such as to_fvx.
Page 115
Select 'a remote VPN gateway'. Figure 8-8: VPN Wizard start page Click Next. Enter the WAN IP address of the remote FVX538. Figure 8-9: WAN IP address of remote FVX538 Click Next. Virtual Private Networking Reference Manual for the ProSafe VPN Firewall 50 FVS338 January 2005...
PCs are to be connected, an additional policy or policies must be created. Each PC will use Netgear's VPN Client. Since the PC's IP address is assumed to be unknown, the PC must always be the Initiator of the connection.
This procedure was developed and tested using: • Netgear FVS338 ProSafe VPN Firewall 50 with version 1.6.11 firmware • Netgear VPN Client version 10.3.5 (Build 6) • NAT router: Netgear FR114P with version 1.5_09 firmware Configuring the FVS338 Select the VPN Wizard Give the client connection a name, such as home.
Page 118
Reference Manual for the ProSafe VPN Firewall 50 FVS338 In the upper left of the Policy Editor window, click the New Document icon to open a New Connection. Figure 8-12: New Client Connection screen 8-10 Virtual Private Networking January 2005...
Page 119
Give the New Connection a name, such as to_FVS. to_FVS Figure 8-13: New connection named In the Remote Party Identity section, select ID Type of IP Subnet. Enter the LAN IP Subnet Address and Subnet Mask of the FVS338's LAN. Select 'Connect using Secure Gateway Tunnel'.
Page 120
Reference Manual for the ProSafe VPN Firewall 50 FVS338 For Domain Name, enter 'fvs_local.com' and enter the WAN IP Address of the FVS338. to_FVS Figure 8-14: Remote client info In the left frame, click on My Identity. Select Certificate = None. Under ID Type, select 'Domain Name'.
Page 121
Leave Virtual Adapter disabled, and select your computer's Network Adapter. Your current IP address will appear. to_FVS Figure 8-15: My Identity screen Before leaving the My Identity menu, click the Pre-Shared Key button. Click Enter Key, type your preshared key, and click OK. Virtual Private Networking Reference Manual for the ProSafe VPN Firewall 50 FVS338 January 2005...
Page 122
Reference Manual for the ProSafe VPN Firewall 50 FVS338 This key will be shared by all users of the FVS338 policy "home". Figure 8-16: Pre-shared key In the left frame, click on Security Policy. 8-14 Virtual Private Networking January 2005...
Page 123
Select Phase 1 Negotiation Mode = Aggressive Mode. PFS should be disabled, and Replay Detection should be enabled. to_FVS Figure 8-17: Client Security Policy screen Virtual Private Networking Reference Manual for the ProSafe VPN Firewall 50 FVS338 January 2005 8-15...
Page 124
Reference Manual for the ProSafe VPN Firewall 50 FVS338 In the left frame, expand Authentication and select Proposal 1. Compare with the figure below. No changes should be necessary. to_FVS Figure 8-18: Client Authorization screen 8-16 Virtual Private Networking January 2005...
In the left frame, expand Key Exchange and select Proposal 1. Compare with the figure below. No changes should be necessary. to_FVS Figure 8-19: Client Key Exchange screen In the upper left of the window, click the disk icon to save the policy. Testing the Connection Right-click on the VPN client icon "My Connections\to_FVS".
Page 126
Reference Manual for the ProSafe VPN Firewall 50 FVS338 For additional status and troubleshooting information, right-click on the VPN client icon your Windows toolbar and select "Connection Monitor" or "Log Viewer", or view the VPN log and status menu in the FVS338. Figure 8-20: Client Connection Monitor screen 8-18 Virtual Private Networking...
As a result and depending on the traffic being carried, the WAN side of the firewall will be the limiting factor to throughput for most installations. Router and Network Management Router and Network Management January 2005...
WAN Users—These settings determine which Internet locations are covered by the rule, based on their IP address. – Any: The rule applies to all Internet IP address. – Single address: The rule applies to a single Internet IP address. 9-3). Router and Network Management January 2005...
Page 129
PCs and devices become known by the following methods: • DHCP Client Request—By default, the DHCP server in this Router is enabled, and will accept and respond to DHCP client requests from PCs and other network devices. These requests also generate an entry in the Network Database.
Features that tend to increase WAN-side loading are as follows: • Port forwarding • Port triggering • Exposed hosts for the procedure on how to use this feature. for the procedure on how to use this feature. January 2005 for the procedure on how Router and Network Management...
• UDP Flooding—Enable this to limit the number of UDP sessions created from one LAN machine. • TCP Flooding—Enable this to protect the router from Syn flood attack. • Enable DNS Proxy—Enable this to allow the incoming DNS queries. •...
• This Router matches the response to the previous request and forwards the response to the PC. Without Port Triggering, this response would be treated as a new connection request rather than a response. As such, it would be handled in accordance with the Port Forwarding rules.
• You can accept the default priority defined by the service itself by not changing its QoS setting. Router and Network Management Reference Manual for the ProSafe VPN Firewall 50 FVS338 for the procedure on how to use this feature.
Changing the Administrator Password and Login Timeout The default password for the firewall’s Web Configuration Manager is password. Netgear recommends that you change this password to a more secure password. From the main menu of the browser interface, under the Management heading, select Set Password to bring up this menu.
Note: If you make the administrator login timeout value too large, you will have to wait a long time before you are able to log back into the router if your previous login was disrupted (i.e., you did not click Logout on the Main Menu bar to log out).
Page 136
Choose a number between 1024 and 65535, but do not use the number of any common service port. The default is 8080, which is a common alternate for HTTP. Click Apply to have your changes take effect. 9-10 Router and Network Management January 2005...
(:) and the custom port number. For example, if your WAN IP address is 134.177.0.123 and you use port number 8080, type the following in your browser: https://134.177.0.123:8080 The router’s remote login URL is https://IP_address:port_number or https://FullyQualifiedDomainName:port_number. If you do not use the SSL https://address, but rather use http://address, the FVS338 will automatically attempt to redirect to https://address.
Log screen that is invoked by clicking Logs and Email under Security on the Main Menu bar. 9-12 Each WAN port is programmed separately. WAN port shuts down once the traffic limit is reached. An email alert can be sent when this shutdown happens. Router and Network Management January 2005...
Page 139
Select the types of alerts to email. Enable email alerts. Accumulate 15 messages before sending an email. Wait 15 seconds before sending sending an email. Accumulate 15 messages before sending an email. Figure 9-4: Logs and email screen Router and Network Management 9-13 January 2005...
SNMP connections. Viewing VPN Firewall Status and Time Information Firewall Status The Router Status menu provides status and usage information. From the main menu of the browser interface, click on Management, then select Router Status to view this screen. 9-14...
Page 141
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Figure 9-5: Router Status screen Router and Network Management 9-15 January 2005...
This is the Account Name that you entered in the Basic Settings page. Firmware Version This is the current software the router is using. This will change if you upgrade your router. LAN Port Information These are the current settings for MAC address, IP address, DHCP role and Subnet Mask that you set in the LAN IP Setup page.
Page 143
Figure 9-6: Time information on the Schedule screen If supported for your region, you can check Automatically adjust for Daylight Savings Time. Router and Network Management Reference Manual for the ProSafe VPN Firewall 50 FVS338 January 2005 Automatic adjustment enable for daylight...
Table 9-1. Current date and time Item Description Use Default NTP If enabled, the system clock is updated regularly by contacting a Default Netgear Servers (Network NTP Server on the Internet. Time Protocol) Use Custom NTP If you prefer to use a particular NTP server, enable this and enter the name or IP Servers address of an NTP Server in the Server 1 Name/IP Address field.
Traffic. The volume of traffic for each protocol will be displayed in a sub-window. Traffic counters are updated in MBytes scale and the counter starts only when traffic passed is at least 1 MB. Router and Network Management Reference Manual for the ProSafe VPN Firewall 50 FVS338 January 2005...
The Attached Devices menu contains a table of all IP devices that the firewall has discovered on the local network. From the Main Menu of the browser interface, under the Security heading, select Groups and Hosts to view the table, shown below. 9-20 Router and Network Management January 2005...
Page 147
PCs and devices become known by the following methods: • DHCP Client Requests—By default, the DHCP server in this Router is enabled, and will accept and respond to DHCP client requests from PCs and other network devices. These requests also generate an entry in the Network Database. Because of this, leaving the DHCP Server feature (on the LAN screen) enabled is strongly recommended.
You can view the DHCP log. Invoke the DHCP Log from LAN IP Setup screen. Figure 9-11: DHCP Log Port Triggering Status You can view the status of port triggering. Invoke the Port Triggering Status screen from Port Triggering screen. Figure 9-12: Port Triggering Status screen 9-22 Router and Network Management January 2005...
You can view the log of the firewall activities. Figure 9-3 shows the Log screen that is invoked by clicking Logs and Email under Security on the Main Menu bar. Router and Network Management Reference Manual for the ProSafe VPN Firewall 50 FVS338 January 2005 9-23...
Page 150
Select the types of logs to email. Enable emailing of logs. Enable system logs. Accumulate 15 messages before sending an email. Wait 15 seconds before sending sending an email. Accumulate 15 messages before sending an email. Router and Network Management January 2005...
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Invoke the Firewall Log screen from Logs and Email screen. Figure 9-14: Firewall Log screen (invoked from Logs and Email screen) VPN Tunnels You can view the status of the VPN tunnels. Router and Network Management 9-25 January 2005...
Page 152
The amount of data transmitted over this SA. State The current status of the SA.Phase 1 is Authentication phase and Phase 2 is Key Exchange phase. Action Use this button to terminate/build the SA (connection) if required. 9-26 Router and Network Management January 2005...
Diagnostics You can perform diagnostics such as pinging an IP address, perform a DNS lookup, display the routing table, reboot the firewall, and capture packets. Note: For normal operation, diagnostics are not required. Router and Network Management 9-27 January 2005...
Page 154
Back to return to the Diagnostics screen. Perform a DNS A DNS (Domain Name Server) converts the Internet name (e.g. www.netgear.com) to Lookup an IP address. If you need the IP address of a Web, FTP, Mail or other Server on the Internet, you can do a DNS lookup to find the IP address.
Description Reboot the Router Use this button to perform a remote reboot (restart). You can use this if the Router seems to have become unstable or is not operating normally. Note: Rebooting will break any existing connections either to the Router (such as this one) or through the Router (for example, LAN users accessing the Internet).
NETGEAR. Upgrade files can be downloaded from Netgear's website. If the upgrade file is compressed (.ZIP file), you must first extract the binary (.TRX) file before sending it to the firewall. The upgrade file can be sent to the firewall using your browser.
Figure 9-19: Router Upgrade menu To upload new firmware: Download and unzip the new software file from NETGEAR. In the Router Upgrade menu, click the Browse button and browse to the location of the binary (.BIN) upgrade file Click Upload.
Page 158
• To restore the factory default configuration settings without knowing the login password or IP address, you must use the Default Reset button on the front panel of the firewall (see Router’s Front Panel” on page Password” on page 10-7.
• Check that you are using the 12 V DC power adapter supplied by NETGEAR for this product. If the error persists, you have a hardware problem and should contact technical support.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 LEDs Never Turn Off When the firewall is turned on, the LEDs turns on for about 10 seconds and then turn off. If all the LEDs stay on, there is a fault within the firewall. If all LEDs are still on one minute after power up: •...
Troubleshooting the Web Configuration Interface If you are unable to access the firewall’s Web Configuration interface from a PC on your local network, check the following: • Check the Ethernet connection between the PC and the firewall as described in the previous section.
Web Configuration Manager. To check the WAN IP address: Launch your browser and select an external site such as www.netgear.com Access the Main Menu of the firewall’s configuration at http://192.168.1.1 Under the Management heading, select Router Status Check that an IP address is shown for the WAN Port If 0.0.0.0 is shown, your firewall has not obtained an IP address from your ISP.
Configure your firewall to spoof your PC’s MAC address. This can be done in the Basic Settings menu. If your firewall can obtain an IP address, but your PC is unable to load any web pages from the Internet: • Your PC may not recognize any DNS server addresses.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 If the path is not working, you see this message: Request timed out If the path is not functioning correctly, you could have one of the following problems: • Wrong physical connections —...
— Your ISP could be rejecting the Ethernet MAC addresses of all but one of your PCs. Many broadband ISPs restrict access by only allowing traffic from the MAC address of your broadband modem, but some ISPs additionally restrict access to the MAC address of a single PC connected to that modem.
Page 166
Reference Manual for the ProSafe VPN Firewall 50 FVS338 10-8 Troubleshooting January 2005...
This appendix provides technical specifications for the FVS338 ProSafe VPN Firewall 50. Network Protocol and Standards Compatibility Data and Routing Protocols: Power Adapter North America: United Kingdom, Australia: Europe: Japan: All regions (output): Physical Specifications Dimensions: Weight: Environmental Specifications Operating temperature: Operating humidity: Technical Specifications Technical Specifications...
Page 168
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Electromagnetic Emissions Meets requirements of: Interface Specifications LAN: WAN: FCC Part 15 Class B VCCI Class B EN 55 022 (CISPR 22), Class B 10BASE-T or 100BASE-Tx, RJ-45 10BASE-T or 100BASE-Tx January 2005 Technical Specifications...
(WAN) link such as a cable or DSL modem. In order to make the best use of the slower WAN link, a mechanism must be in place for selecting and transmitting only the data traffic meant for the Internet. The function of selecting and forwarding this data is performed by a router. Network, Routing, Firewall, and Basics...
IP protocol over a single-user broadband connection. Routing Information Protocol One of the protocols used by a router to build and maintain a picture of the network is the Routing Information Protocol (RIP). Using RIP, routers periodically update one another and check for changes to add to the routing table.
Page 171
The latter version is easier to remember and easier to enter into your computer. In addition, the 32 bits of the address are subdivided into two parts. The first part of the address identifies the network, and the second part identifies the host node or station on the network. The dividing point may vary depending on the address range and the application.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • Class C Class C addresses can have 254 hosts on a network. Class C addresses use 24 bits for the network address and eight bits for the node. They are in this range: 192.0.1.x to 223.255.254.x.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 As a shorter alternative to dotted-decimal notation, the netmask may also be expressed in terms of the number of ones from the left. This number is appended to the IP address, following a backward slash (/), as “/n.”...
Page 174
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Although the preceding example uses the entire third octet for a subnet address, note that you are not restricted to octet boundaries in subnetting. To create more network numbers, you need only shift some bits from the host address to the network address.
• So that a local router or bridge recognizes which addresses are local and which are remote Private IP Addresses If your local network is isolated from the Internet (for example, when using NAT), you can assign any IP addresses to the hosts without problems.
IP addresses from the ISP. This type of Internet account is more costly than a single-address account typically used by a single user with a modem, rather than a router. The FVS338 VPN firewall employs an address-sharing method called Network Address Translation (NAT).
Internet through the translated connection. All incoming inquiries are filtered out by the router. This filtering can prevent intruders from probing your system. However, using port forwarding, you can allow one PC (for example, a Web server) on your local network to be accessible to outside users.
Many of the resources on the Internet can be addressed by simple descriptive names such as www.NETGEAR.com. This addressing is very helpful at the application level, but the descriptive name must be translated to an IP address in order for a user to actually contact the resource. Just as...
A firewall is a device that protects one network from another, while allowing communication between the two. A firewall incorporates the functions of the NAT router, while adding features for dealing with a hacker intrusion or attack. Several known types of intrusion or attack can be recognized when they occur.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Table B-1. UTP Ethernet cable wiring, straight-through Wire color Signal Orange/White Transmit (Tx) + Orange Transmit (Tx) - Green/White Receive (Rx) + Blue Blue/White Green Receive (Rx) - Brown/White Brown Category 5 Cable Quality Category 5 distributed cable that meets ANSI/EIA/TIA-568-A building wiring standards can be a maximum of 328 feet (ft.) or 100 meters (m) in length, divided as follows: 20 ft.
Inside Twisted Pair Cables For two devices to communicate, the transmitter of each device must be connected to the receiver of the other device. The crossover function is usually implemented internally as part of the circuitry in the device. Computers and workstation adapter cards are usually media-dependent interface ports, called MDI or uplink ports.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Figure B-3: Category 5 UTP Cable with Male RJ-45 Plug at Each End Note: Flat “silver satin” telephone cable may have the same RJ-45 plug. However, using telephone cable results in excessive collisions, causing the attached port to be partitioned or disconnected from the network.
Page 183
(e.g. connecting to a PC) or an uplink connection (e.g. connecting to a router, switch, or hub). That port will then configure itself to the correct configuration. This feature also eliminates the need to worry about crossover cables, as Auto Uplink will accommodate either type of cable to make the right connection.
Page 184
Reference Manual for the ProSafe VPN Firewall 50 FVS338 B-16 Network, Routing, Firewall, and Basics January 2005...
This appendix describes how to prepare your network to connect to the Internet through the FVS338 ProSafe VPN Firewall 50 and how to verify the readiness of broadband Internet service from an Internet service provider (ISP). Note: If an ISP technician configured your computer during the installation of a broadband modem, or if you configured it using instructions provided by your ISP, you may need to copy the current configuration information for use in the configuration of your firewall.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 In your IP network, each PC and the firewall must be assigned a unique IP addresses. Each PC must also have certain other IP configuration information such as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address.
Page 187
You must have an Ethernet adapter, the TCP/IP protocol, and Client for Microsoft Networks. Note: It is not necessary to remove any other network components shown in the Network window in order to install the adapter, TCP/IP, or Client for Microsoft Networks.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 If you need Client for Microsoft Networks: Click the Add button. Select Client, and then click Add. Select Microsoft. Select Client for Microsoft Networks, and then click OK. Restart your PC for the changes to take effect. Enabling DHCP to Automatically Configure TCP/IP Settings After the TCP/IP protocol components are installed, each PC must be assigned specific information about itself and resources that are available on its network.
Page 189
Verify the following settings as shown: • Client for Microsoft Network exists • Ethernet adapter is present • TCP/IP is present • Primary Network Logon is set to Windows logon Click on the Properties button. The following TCP/IP Properties window will display.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • By default, the IP Address tab is open on this window. • Verify the following: Obtain an IP address automatically is selected. If not selected, click in the radio button to the left of it to select it. This setting is required to enable the DHCP server to automatically assign an IP address.
From the drop-down box, select your Ethernet adapter. The window is updated to show your settings, which should match the values below if you are using the default TCP/IP settings that NETGEAR recommends for connecting through a router or gateway: •...
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Enabling DHCP to Automatically Configure TCP/IP Settings You will find there are many similarities in the procedures for different Windows systems when using DHCP to configure TCP/IP. The following steps will walk you through the configuration process for each of these versions of Windows.
Page 193
• Now you should be at the Local Area Network Connection Status window. This box displays the connection status, duration, speed, and activity statistics. • Administrator logon access rights are needed to use this window. • Click the Properties button to view details about the connection.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • Verify that the Obtain an IP address automatically radio button is selected. • Verify that Obtain DNS server address automatically radio button is selected. • Click the OK button. This completes the DHCP configuration of TCP/ IP in Windows XP.
Page 195
• Click on the My Network Places icon on the Windows desktop. This will bring up a window called Network and Dial-up Connections. • Right click on Local Area Connection and select Properties. • The Local Area Connection Properties dialog box appears. •...
Page 196
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • With Internet Protocol (TCP/IP) selected, click on Properties to open the Internet Protocol (TCP/IP) Properties dialogue box. • Verify that • Obtain an IP address automatically is selected. • Obtain DNS server address automatically is selected.
DHCP Configuration of TCP/IP in Windows NT4 Once you have installed the network card, you need to configure the TCP/IP environment for Windows NT 4.0. Follow this procedure to configure TCP/IP with DHCP in Windows NT 4.0. • Choose Settings from the Start Menu, and then select Control Panel. This will display Control Panel window.
Page 198
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • Highlight the TCP/IP Protocol in the Network Protocols box, and click on the Properties button. C-14 January 2005 Preparing Your Network...
Type ipconfig /all Your IP Configuration information will be listed, and should match the values below if you are using the default TCP/IP settings that NETGEAR recommends for connecting through a router or gateway: • The IP address is between 192.168.0.2 and 192.168.0.254 •...
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • The default gateway is 192.168.1.1 Type exit Configuring the Macintosh for TCP/IP Networking Beginning with Macintosh Operating System 7, TCP/IP is already installed on the Macintosh. On each networked Macintosh, you will need to configure TCP/IP to use DHCP. MacOS 8.6 or 9.x From the Apple menu, select Control Panels, then TCP/IP.
TCP/IP Control Panel. From the Apple menu, select Control Panels, then TCP/IP. The panel is updated to show your settings, which should match the values below if you are using the default TCP/IP settings that NETGEAR recommends: •...
WinPOET or EnterNet, then your account uses PPP over Ethernet (PPPoE). When you configure your router, you will need to enter your login name and password in the router’s configuration menus. After your network and firewall are configured, the firewall will perform the login task when needed, and you will no longer need to run the login program from your PC.
• An IP address and subnet mask • A gateway IP address, which is the address of the ISP’s router • One or more domain name server (DNS) IP addresses • Host name and domain suffix For example, your account’s full server names may look like this: mail.xxx.yyy.com...
In this case, close the Control Panel and skip the rest of this section. If an IP address and subnet mask are shown, write down the information. If an IP address appears under Router address, write down the address. This is the ISP’s gateway address.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Restarting the Network Once you’ve set up your computers to work with the firewall, you must reset the network for the devices to be able to communicate correctly. Restart any computer that is connected to the FVS338 VPN firewall.
Page 206
Reference Manual for the ProSafe VPN Firewall 50 FVS338 C-22 Preparing Your Network January 2005...
There have been many improvements in the Internet including Quality of Service, network performance, and inexpensive technologies, such as DSL. But one of the most important advances has been in Virtual Private Networking (VPN) Internet Protocol security (IPSec). IPSec is one of the most complete, secure, and commercially available, standards-based protocols developed for transporting data.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • Remote Access: Remote access enables telecommuters and mobile workers to access e-mail and business applications. A dial-up connection to an organization’s modem pool is one method of access for remote workers, but is expensive because the organization must pay the associated long distance telephone and service costs.
• Encapsulating Security Payload (ESP): Provides confidentiality, authentication, and integrity. • Authentication Header (AH): Provides authentication and integrity. • Internet Key Exchange (IKE): Provides key management and Security Association (SA) management. Encapsulating Security Payload (ESP) ESP provides authentication, integrity, and confidentiality, which protect against data tampering and, most importantly, provide message content protection.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 The ESP header is inserted into the packet between the IP header and any subsequent packet contents. However, because ESP encrypts the data, the payload is changed. ESP does not encrypt the ESP header, nor does it encrypt the ESP authentication.
Mode SAs operate using modes. A mode is the method in which the IPSec protocol is applied to the packet. IPSec can be used in tunnel mode or transport mode. Typically, the tunnel mode is used for gateway-to-gateway IPSec tunnel protection, while transport mode is used for host-to-host IPSec tunnel protection.
This TechNote provides case studies on how to configure a secure IPSec VPN tunnels. This document assumes the reader has a working knowledge of NETGEAR management systems. NETGEAR is a member of the VPN Consortium, a group formed to facilitate IPSec VPN vendor interoperability. The VPN Consortium has developed specific scenarios to aid system administrators in the often confusing process of connecting two different vendor implementations of the IPSec standard.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 VPN Process Overview Even though IPSec is standards-based, each vendor has its own set of terms and procedures for implementing the standard. Because of these differences, it may be a good idea to review some of the terms and the generic processes for connecting two gateways before diving into to the specifics.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 It is also important to make sure the addresses do not overlap or conflict. That is, each set of addresses should be separate and distinct. Table 10-1. WAN (Internet/Public) and LAN (Internal/Private) Addressing Gateway LAN or WAN Gateway A...
Page 215
VPN Gateway A Figure 10-8: VPN Tunnel SA The SA contains all the information necessary for gateway A to negotiate a secure and encrypted communication stream with gateway B. This communication is often referred to as a “tunnel.” The gateways contain this information so that it does not have to be loaded onto every computer connected to the gateways.
Reference Manual for the ProSafe VPN Firewall 50 FVS338 IKE Phase I. The two parties negotiate the encryption and authentication algorithms to use in the IKE SAs. The two parties authenticate each other using a predetermined mechanism, such as preshared keys or digital certificates. A shared master key is generated by the Diffie-Hellman Public key algorithm within the IKE framework for the two parties.
LAN-side of the other gateway. You can troubleshoot connections using the VPN status and log details on the Netgear gateway to determine if IKE negotiation is working. Common problems encountered in setting up VPNs include: •...
Page 218
Reference Manual for the ProSafe VPN Firewall 50 FVS338 • [RFC 791] Internet Protocol DARPA Internet Program Protocol Specification, Information Sciences Institute, USC, September 1981. • [RFC 1058] Routing Information Protocol, C Hedrick, Rutgers University, June 1988. • [RFC 1483] Multiprotocol Encapsulation over ATM Adaptation Layer 5, Juha Heinanen, Telecom Finland, July 1993.
Glossary List of Glossary Terms Use the list below to find definitions for technical terms used in this manual. Numeric 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring. 100BASE-Tx IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring. 802.1x 802.1x defines port-based, network access control used to provide authenticated network access and automated data encryption key management.
Page 220
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Access Control List (ACL) An ACL is a database that an Operating System uses to track each user’s access rights to system objects (such as file directories and/or files). Ad-hoc Mode An 802.11 networking framework in which devices or stations communicate directly with each other, without the use of an access point (AP).
Page 221
DHCP An Ethernet protocol specifying how a centralized DHCP server can assign network configuration information to multiple DHCP clients. The assigned information includes IP addresses, DNS addresses, and gateway (router) addresses. Glossary January 2005...
Page 222
.com, .edu, .uk, etc. For example, in the address mail.NETGEAR.com, mail is a server name and NETGEAR.com is the domain. Short for digital subscriber line, but is commonly used in reference to the asymmetric version of this technology (ADSL) that allows data to be sent over existing copper telephone lines at data rates of from 1.5...
Page 223
A LAN specification developed jointly by Xerox, Intel and Digital Equipment Corporation. Ethernet networks transmit packets at a rate of 10 Mbps. Gateway A local device, usually a router, that connects hosts on a local network to other networks. ICMP See “Internet Control Message Protocol”...
Page 224
Reference Manual for the ProSafe VPN Firewall 50 FVS338 BSSs that form a single subnetwork. Most corporate wireless LANs operate in infrastructure mode because they require access to the wired LAN in order to use services such as file servers or printers. Internet Control Message Protocol ICMP is an extension to the Internet Protocol (IP) that supports packets containing error, control, and informational messages.
Page 225
Reference Manual for the ProSafe VPN Firewall 50 FVS338 See “Local Area Network” Local Area Network A communications network serving users within a limited area, such as one floor of a building. A LAN typically connects multiple personal computers and shared network devices such as storage and printers. Although many technologies exist to implement a LAN, Ethernet is the most common for connecting personal computers and is limited to a distance of 1,500 feet.
Page 226
Reference Manual for the ProSafe VPN Firewall 50 FVS338 router, or access point, the perspective is reversed, and the hub receives on pins 1 and 2. This wiring is referred to as Media Dependant Interface - Crossover (MDI-X). The size in bytes of the largest packet that can be sent or received.
Page 227
Request For Comment. Refers to documents published by the Internet Engineering Task Force (IETF) proposing standard protocols and procedures for the Internet. RFCs can be found at www.ietf.org. router A device that forwards data between networks. An IP router forwards data based on IP source and destination addresses. SSID A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network.
Subnet Mask Combined with the IP address, the IP Subnet Mask allows a device to know which other addresses are local to it, and which must be reached through a gateway or router. TCP/IP The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with the Transfer Control Protocol (TCP) form TCP/IP.
Page 229
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks. All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for data encryption. Wide Area Network A WAN is a computer network that spans a relatively large geographical area.
Page 230
Reference Manual for the ProSafe VPN Firewall 50 FVS338 Glossary January 2005...
Need help?
Do you have a question about the ProSafe FVS338 and is the answer not in the manual?
Questions and answers