NETGEAR FVS318v3 manual Make sure the Ethernet cables are securely plugged

Page 31

Reference Manual for the ProSafe VPN Firewall FVS318v3

Make sure the Ethernet cables are securely plugged in.

The Internet link light on the VPN firewall router will be lit if the Ethernet cable to the VPN firewall router from the modem is plugged in securely and the modem and VPN firewall router are turned on.

For each powered on computer connected to the VPN firewall router with a securely plugged in Ethernet cable, the corresponding VPN firewall router LOCAL port link light will be lit. The labels on the front and back of the VPN firewall router identify the number of each LOCAL port.

Make sure the network settings of the computer are correct.

LAN connected computers must be configured to obtain an IP address automatically via DHCP. Please see Appendix D, “Preparing Your Network or the animated tutorials on the Resource CD for help with this.

Some cable modem ISPs require you to use the MAC address of the computer registered on the account. If so, in the Router MAC Address section of the Basic Settings menu, select “Use this Computer’s MAC Address.” The firewall will then capture and use the MAC address of the computer that you are now using. You must be using the computer that is registered with the ISP. Click Apply to save your settings. Restart the network in the correct sequence.

Use the status lights on the front of the FVS318v3 to verify correct firewall operation.

If the FVS318v3 power light does not turn solid green or if the test light does not go off within two minutes after turning the firewall on, reset the firewall according to the instructions in “Backing Up the Configuration” on page 7-7.

Connecting the Firewall to the Internet

3-7

January 2005

Image 31
Contents Reference Manual for the ProSafe VPN Firewall FVS318v3 Statement of Conditions TrademarksEN 55 022 Declaration of Conformance Certificate of the Manufacturer/Importer Bestätigung des Herstellers/ImporteursVoluntary Control Council for Interference Vcci Statement Product and Publication Details Contents Chapter Firewall Protection Content Filtering Chapter Advanced Virtual Private Networking Chapter Advanced Configuration Appendix C Virtual Private Networking Appendix D Preparing Your Network Glossary Xii Contents Typographical Conventions Audience, Scope, Conventions, and FormatsManual Scope How to Use This Manual Printing the Full Manual How to Print this ManualPrinting a Page in the Html View Printing a ChapterReference Manual for the ProSafe VPN Firewall FVS318v3 Chapter Introduction Key Features of the VPN FirewallSecurity Powerful, True Firewall with Content FilteringExtensive Protocol Support Autosensing Ethernet Connections with Auto UplinkMaintenance and Support Easy Installation and ManagementPackage Contents LED Descriptions FVS318v3 Rear PanelNetgear Product Registration, Support, and Documentation NETGEAR-Related ProductsNETGEAR-Related Products Reference Manual for the ProSafe VPN Firewall FVS318v3 First, Connect the FVS318v3 Prepare to Install Your FVS318v3 ProSafe VPN FirewallModem Disconnect the Ethernet cable from the computerRestart Your Network in the Correct Sequence Status lights Now, Configure the FVS318v3 for Internet AccessNetgear Smart Wizard Configuration Assistant welcome screen Be sure to restart your network in this sequence Troubleshooting TipsMake sure the Ethernet cables are securely plugged Make sure the network settings of the computer are correctWays to access the firewall Overview of How to Access the FVS318v3 VPN FirewallLogin URL Login result FVS318v3 home How to Bypass the Configuration AssistantUsing the Smart Setup Wizard ISP Does Not Require Login How to Manually Configure Your Internet ConnectionReference Manual for the ProSafe VPN Firewall FVS318v3 11 Basic Settings ISP list Firewall Protection and Content Filtering Overview Chapter Firewall Protection Content FilteringBlock Sites menu Block SitesRules menu Using Rules to Block or Allow Specific Kinds of TrafficReference Manual for the ProSafe VPN Firewall FVS318v3 Inbound Rule Example a Local Public Web Server Inbound Rules Port ForwardingRule example a videoconference from restricted addresses Considerations for Inbound RulesOutbound Rule Example Blocking Instant Messenger Outbound Rules Service BlockingOrder of Precedence for Rules Default DMZ ServerRespond to Ping on Internet WAN Port Click Default DMZ ServerServices menu ServicesAdd Custom Service menu Schedule Using a Schedule to Block or Allow Specific TrafficTime Zone 10 E-mail menu Getting E-Mail Notifications of Event Logs and AlertsReference Manual for the ProSafe VPN Firewall FVS318v3 11 Logs menu Viewing Logs of Web Access or Attempted Web AccessLog entry descriptions SyslogLog action buttons Reference Manual for the ProSafe VPN Firewall FVS318v3 Chapter Basic Virtual Private Networking VPN Tunnel PCs AES Configuration Configuring the Client-to-Gateway VPN Tunnel on the FVS318v3 Summary screen below displays Vpnc Recommended Settings Configuring the Netgear ProSafe VPN Client on the Remote PC Security Policy Editor new connection 10 Security Policy Editor connection settings 11 Security Policy Editor Security Policy 12 Security Policy Editor My Identity 14 Security Policy Editor Authentication 15 Security Policy Editor Key Exchange 16 Running a Ping test to the LAN from the PC 18 Log Viewer screen Exporting a Security Policy Transferring a Security Policy to Another ClientSelect Export Security Policy from the File pulldown Scenario1 Importing a Security PolicyBasic 23 VPN Wizard start screen Procedure to Configure a Gateway-to-Gateway VPN Tunnel25 Remote IP 27 VPN Wizard Summary 28 VPN Recommended Settings 30 VPN Status/Log screen Activating a VPN Tunnel Start Using a VPN Tunnel to Activate ItUsing the VPN Status Page to Activate a VPN Tunnel VPN Tunnel Control32 VPN Status/Log screen Activate the VPN Tunnel by Pinging the Remote EndpointType ping Type ping -t 192.168.3.1 and then click OK36 Pinging test results Verifying the Status of a VPN Tunnel38 Current VPN Tunnels SAs screen Deactivating a VPN Tunnel39 VPN Policies Using the VPN Status Page to Deactivate a VPN Tunnel41 Current VPN Tunnels SAs screen Deleting a VPN TunnelFVS318v3 VPN Firewall Using Automatic Key Management Using Policies to Manage VPN TrafficIKE Policy Configuration Menu IKE Policies’ Automatic Key and Authentication ManagementField Description General IKE Policy Configuration fieldsField Description Remote VPN Policy Configuration for Auto Key NegotiationVPN Auto Policy menu VPN Auto Policy fields are defined in the following table VPN Auto Policy Configuration FieldsAuthenticating Header AH Netbios Enable VPN Policy Configuration for Manual Key ExchangeVPN Manual Policy menu VPN Manual Policy fields are defined in the following table VPN Manual Policy Configuration FieldsValue in its Authentication Algorithm Key Out field Netbios Enable Certificate Revocation List CRL Walk-Through of Configuration Scenarios on the FVS318v3VPN Consortium Scenario Scenario 1 are Using IPv4 FVS318v3 Internet IP Address menu WAN IP addressesLAN IP Setup menu Scenario 1 IKE Policy Set up the IKE Policy illustrated below on the FVS318v310 Scenario 1 VPN Auto Policy Set up the FVS318v3 VPN -Auto Policy illustrated belowTesting the Gateway a FVS318v3 LAN and the Gateway B LAN How to Check VPN ConnectionsObtain a root certificate Install the trusted CA certificate for the Trusted Root CACreate a certificate request for the FVS318v3 11 Generate Self Certificate Request menu 12 Self Certificate Request data Highlight, copy and paste this data into a text file13 Self Certificate Requests table Click the Upload Certificate button14 Self Certificates table Set up Certificate Revocation List CRL checking Reference Manual for the ProSafe VPN Firewall FVS318v3 Router Status screen Viewing VPN Firewall Status InformationFVS318v3 Status fields This screen shows the following parametersConnection Status action buttons Connection Status fieldsRouter Statistics fields Router Statistics screenUpgrading the Firewall Software Viewing a List of Attached DevicesRouter Upgrade menu Backing Up the Configuration Configuration File ManagementRestoring the Configuration Erasing the Configuration Changing the Administrator PasswordHow to Configure Dynamic DNS Chapter Advanced ConfigurationUsing the LAN IP Setup Options Configuring LAN TCP/IP Setup Parameters Using the Firewall as a Dhcp server Using Address Reservation Configuring Static RoutesClick Edit or Delete Static Routes table Static Route Example Enabling Remote Management AccessHttps//134.177.0.1238080 Reference Manual for the ProSafe VPN Firewall FVS318v3 Reference Manual for the ProSafe VPN Firewall FVS318v3 Basic Functioning Power LED Not OnLAN or Internet Port LEDs Not On LEDs Never Turn OffTroubleshooting the Web Configuration Interface Troubleshooting the ISP Connection Testing the LAN Path to Your Firewall Troubleshooting a TCP/IP Network Using a Ping UtilityPing -n 10 IP address Testing the Path from Your PC to a Remote DeviceProblems with Date and Time Restoring the Default Configuration and PasswordReference Manual for the ProSafe VPN Firewall FVS318v3 Network Protocol and Standards Compatibility Power AdapterPhysical Specifications Environmental SpecificationsElectromagnetic Emissions Interface SpecificationsRelated Publications Basic Router Concepts Appendix B Network, Routing, and Firewall BasicsIP Addresses and the Internet What is a Router?Routing Information Protocol Figure B-1 Three Main Address Classes Equals NetmaskFigure B-2 Example of Subnetting a Class B Address Subnet AddressingTable B-2. Netmask formats Table B-1 Netmask notation translation table for one octetTable B-2 Netmask formats Private IP AddressesFigure B-3 Single IP Address Operation Using NAT Single IP Address Operation Using NATRelated Documents MAC Addresses and Address Resolution ProtocolDomain Name Server Internet Security and Firewalls IP Configuration by DhcpStateful Packet Inspection What is a Firewall?Denial of Service Attack Ethernet CablingCategory 5 Cable Quality Table B-3 UTP Ethernet cable wiring, straight-throughFigure B-4 Straight-through twisted-pair cable Inside Twisted Pair CablesUplink Switches, Crossover Cables, and MDI/MDIX Switching Reference Manual for the ProSafe VPN Firewall FVS318v3 Reference Manual for the ProSafe VPN Firewall FVS318v3 Appendix C Virtual Private Networking What is a VPN?IPSec Security Features What Is IPSec and How Does It Work?IPSec Components Encapsulating Security Payload ESP IKE Security Association Authentication Header AHMode Key Management Understand the Process Before You BeginAddresses VPN Process OverviewFirewalls VPN Tunnel Between GatewaysTable C-2 Subnet addressing VPN Tunnel Negotiation Steps IPSec Security Association IKEVpnc IKE Security Parameters Vpnc IKE Phase I ParametersVpnc IKE Phase II Parameters Testing and TroubleshootingAdditional Reading Relevant RFCs listed numerically Preparing Your Computers for TCP/IP Networking Appendix D Preparing Your NetworkInstall or Verify Windows Networking Components Configuring Windows 95, 98, and Me for TCP/IP NetworkingSelect Microsoft Choose Settings, and then Control Panel Enabling Dhcp to Automatically Configure TCP/IP SettingsPrimary Network Logon is set to Windows logon Verifying TCP/IP Properties Selecting Windows’ Internet Access MethodDouble-click the Network and Dialup Connections icon Configuring Windows NT4, 2000 or XP for IP NetworkingLocate your Network Neighborhood icon Dhcp Configuration of TCP/IP in Windows XPReference Manual for the ProSafe VPN Firewall FVS318v3 Dhcp Configuration of TCP/IP in Windows Reference Manual for the ProSafe VPN Firewall FVS318v3 Obtain an IP address automatically is selected Dhcp Configuration of TCP/IP in Windows NT4 Reference Manual for the ProSafe VPN Firewall FVS318v3 TCP/IP Properties dialog box now displays Verifying TCP/IP Properties for Windows XP, 2000, and NT4MacOS 8.6 or Configuring the Macintosh for TCP/IP NetworkingMacOS Verifying TCP/IP Properties for Macintosh Computers What Is Your Configuration Information? Are Login Protocols Used?Verifying the Readiness of Your Internet Account Select the IP Address tab Reference Manual for the ProSafe VPN Firewall FVS318v3 Restarting the Network Reference Manual for the ProSafe VPN Firewall FVS318v3 Gathering the Network Information Case Study OverviewConfigure Log in to Use the VPN Wizard to To Figure E-3 Verify the information example screen Example screen Activating the VPN Tunnel Figure E-4 Testing FlowchartSummary FVS318v3-to-FVS318v3 CaseUse the VPN Wizard to configure the FVS318v3 at Gateway a Continue as shown in Figure E-3 Gateway a VPN Parameter EntryGateway a VPN Policy Parameters Viewing and Editing the VPN ParametersGateway a IKE Parameters Initiating and Checking the VPN Connections VPN Status at Gateway B FVS318v3 VPN Status at Gateway a FVS318v3FVS318v3-to-FVS318v2 Case Use the VPN Wizard to configure the FVS318v3 at Gateway a Continue as shown in Figure E-3 Viewing and Editing the VPN Parameters Reference Manual for the ProSafe VPN Firewall FVS318v3 Initiating and Checking the VPN Connections Status of VPN tunnel to and from Gateway a IPSec Connection Status at Gateway B FVS318v2FVS318v3-to-FVL328 Case Use the VPN Wizard to configure the FVS318v3 at Gateway a Continue as shown in Figure E-3 Viewing and Editing the VPN Parameters Gateway a IKE Parameters Initiating and Checking the VPN Connections IPSec Connection Status at Gateway B FVL328 Table E-5 Differences between VPN tunnel types FVS318v3-to-VPN Client CaseClient-to-Gateway VPN Tunnel Overview Table E-4 Policy SummaryConnection Type a Remote VPN Client Configuring the VPN TunnelFigure E-20 VPN Wizard at Gateway a FVS318v3 Figure E-21 VPN parameters at Gateway a FVS318v3 Figure E-22 Adding and renaming a new connection Figure E-23 Scenario1 connection screen parameters Figure E-24 Scenario1 Security Policy screen parameters Figure E-25 Scenario1 My Identity screen parameters Reference Manual for the ProSafe VPN Firewall FVS318v3 Figure E-27 Scenario1 connection launch from VPN Client PC Choose Scenario1See Figure E-28for the resulting status screens Select Connection MonitorConnection Monitor at Gateway B remote VPN Client Numeric List of Glossary TermsPacket sent to all devices on a network Dhcp See Internet Control Message Protocol Ieee Internet service provider Megabits per second Set of rules for communication between devices on a network See Wide Area Network Wins
Related manuals
Manual 2 pages 21.29 Kb

FVS318v3 specifications

The NETGEAR FVS318v3 is a powerful dual WAN gigabit VPN firewall designed to provide robust security and reliable connectivity for small to medium-sized businesses. It offers an array of features and technologies that make it an outstanding choice for organizations requiring secure network access and improved bandwidth management.

One of the standout features of the FVS318v3 is its dual WAN capability. This allows users to connect two separate internet connections, which enhances redundancy and ensures continuous network availability. In the event that one WAN connection fails, the device automatically switches to the backup connection, minimizing downtime and maintaining productivity.

The firewall offers advanced security features, including a stateful packet inspection (SPI) firewall and NAT (Network Address Translation), which helps protect the network from unauthorized access and external threats. Additionally, the FVS318v3 supports IPsec and SSL VPN protocols, providing secure remote access for employees working from home or on the go. With support for up to 15 SSL VPN clients and 20 IPsec VPN tunnels, it is suitable for businesses that require flexible and secure remote connectivity.

In terms of performance, the FVS318v3 boasts a high-speed gigabit throughput, ensuring fast data transmission and minimal latency. This is particularly important for businesses that rely on cloud-based applications, video conferencing, and other bandwidth-intensive activities. Furthermore, the device is equipped with advanced QoS (Quality of Service) features that allow administrators to prioritize traffic, ensuring that critical applications receive the bandwidth they need during peak usage times.

Another noteworthy characteristic of the NETGEAR FVS318v3 is its user-friendly interface, which simplifies network management and configuration. Administrators can easily set up policies, monitor traffic, and manage connected devices through an intuitive web-based interface. It also offers support for 802.1Q VLAN tagging, allowing for network segmentation and improved security management.

In conclusion, the NETGEAR FVS318v3 is a versatile and feature-rich solution that delivers exceptional security and reliability for businesses. Its dual WAN functionality, advanced VPN capabilities, high-speed performance, and ease of use make it an excellent choice for organizations looking to safeguard their networks while ensuring seamless connectivity for employees.