Global Technology Associates GBWA200501-01 Re-configuring Your Computer, Accessing the Firewall

Page 32

28 GB-Ware Firewall Product Guide

Using CIDR-based or Slash (/) Notation

CIDR (Classless Inter-Domain Routing) aggregates routes so that one

IP address represents thousands served by a backbone provider. GNAT Box System Software uses CIDR-based notation as the default for subnet masks, instead of dotted decimal (e.g. 255.255.255.0) notation.

Instead of the fixed 8, 16 and 24 bits used in dotted decimal Class A, B, or C net masks, CIDR-based notation can further divide the network into subnets by using bit masking of any number from 1 to 32 to determine network class (/32 representing one IP address). For example, the CIDR address 204.12.01.42/24 indicates that the first 24 bits are used for the network class ID. The /24 mask includes 254 hosts on the network, and is equivalent to 255.255.255.0 in dotted-decimal notation.

Calculate a CIDR-based notation net mask by converting the dotted decimal net mask to binary and count the ones. For a Class C network, the dotted decimal net mask is 255.255.255.0. The binary notation of that net mask is 11111111.11111111.11111111.00000000. There are 24 ones, so the CIDR notation would be /24. Using a 255.255.255.240 net mask, the binary repre- sentation would be: 11111111.11111111.11111111.11110000. The notation would be /28.

You may also enter a host address that is defined by not including a bit mask (e.g. 192.168.123.1). This is equivalent to a /32 bit mask. To enter a range of addresses, use a hyphen (-) between the two extremes of the range (e.g. 192.168.123.0-192.168.123.255).

Dotted decimal may still be used by entering the dotted decimal net mask after the forward slash.

Re-configuring Your Computer

If you temporarily changed your computer’s network configuration to connect to the firewall, restore the original configuration now. If you formed a temporary peer network during network configuration, disassemble it now; reconnect your computer and the firewall to your network. Now your computer and firewall should both be members of your network. Reboot your computer if necessary to affect the network configuration change.

Accessing the Firewall

Access the firewall using the IP address you assigned to the protected network.

The firewall should now be active and functioning in default security mode (all internal users are allowed outbound and no unsolicited inbound connec- tions are allowed). You can now perform any additional configuration tasks, including changing the administrative password.

Image 32
Contents GB-Ware Tel +1.407.380.0220 Contents Troubleshooting About GB-Ware FeaturesAbout GTA Firewalls Additional Options for 10-User Version Optional FeaturesAdditional Software Products Software Specifications Hardware SpecificationsSystem Requirements PPP Hardware Optional ComponentsMemory Recommendations Support Support OptionsDocumentation Conventions UpgradesAbout This Guide Additional Documentation Mailing ListRegistration Getting Your Activation CodeInstalling GB-Ware on PC Hardware RequirementsInstalling the Compact Flash Card Reader or IDE Adapter Setup for GB-Ware InstallationSetting the Boot Sequence Using GB-Ware’s Gnat Box Installer Selecting a GB-Ware Runtime Selecting an Installation Disk Installing the Runtime Completing Installation Attaching the Hardware Key BlockInstallation GB-Ware Firewall Product Guide Loading the Correct Memory Slice Partition Setting the Boot SequenceSelecting a User Interface Physically Connecting Your GB-Ware Firewall If using the web user interface, you will need Making a Temporary Peer Network ConnectionGB-Ware Firewall Product Guide Making a Serial Connection Making a Video ConnectionConfiguring Your Firewall Browser CompatibilityConfiguration Using a Web Browser Entering Your Network Information On the Network Information sectionEntering a Network Configuration Using a Browser Re-configuring Your Computer Accessing the FirewallConfiguration Using GBAdmin GBAdmin Network Information Window Configuration Using the Serial Console Configuration Using the Video Console HardwareUsing the Setup Wizard Video Console NavigationSetup Wizard Run DHCP? Quantity of Addresses Network Class IP Address Range Accessing Your GTA Firewall GB-Ware Firewall Product Guide Troubleshooting Basics Frequently Asked Questions FAQWhy cant I see or ping the protected network interface? Hardware Key Block Settings Installation of the USB Key Block Power on the firewall. The following words will display Use these troubleshooting steps My system did not auto-detect the Compact Flash GB-Ware Firewall Product Guide Installing the Compact Flash Card AppendixLocating IDE Controller Ports Installing the Compact Flash IDE AdapterAssembling the Compact Flash IDE Adapter Mounting the Compact Flash Card Moving an Old Configuration to GB-Ware Connecting the IDE CableConnecting the Power Supply Merging Configurations Using GBAdmin FileMerge the GB360.GBcfg using GBAdmin Page GB-Ware Firewall Product Guide Symbols IndexSPP