NETGEAR DGFV338 manual MD5

Page 9

 

DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual

 

 

 

 

MD5

Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.

 

License to copy and use this software is granted provided that it is identified as the "RSA Data

 

Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this

 

software or this function. License is also granted to make and use derivative works provided

 

that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-

 

Digest Algorithm" in all material mentioning or referencing the derived work.

 

RSA Data Security, Inc. makes no representations concerning either the merchantability of

 

this software or the suitability of this software for any particular purpose. It is provided "as is"

 

without express or implied warranty of any kind.

These notices must be retained in any copies of any part of this documentation and/or software.

PPPCopyright (c) 1989 Carnegie Mellon University. All rights reserved.

Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Zlib

zlib.h -- interface of the 'zlib' general purpose compression library version 1.1.4, March 11th,

 

2002. Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler.

This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

1.The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.

2.Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.

3.This notice may not be removed or altered from any source distribution.

Jean-loup Gailly: jloup@gzip.org; Mark Adler: madler@alumni.caltech.edu

The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files ftp://ds.internic.net/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format) and rfc1952.txt (gzip format)

ix

v1.0, April 2007

Image 9
Contents NETGEAR, Inc Technical Support Placement and Range GuidelinesTrademarks Statement of ConditionsFCC Requirements for Operation in the United States FCC StatementEurope EU Declaration of Conformity Português Bestätigung des Herstellers/Importeurs Certificate of the Manufacturer/ImporterVoluntary Control Council for Interference Vcci Statement Terms Additional CopyrightsViii MD5 DGFV338 Product and Publication DetailsContents Chapter Wireless Configuration Chapter Virtual Private Networking Chapter LAN Configuration Appendix a Default Settings and Technical Specifications Xvi Conventions, Format and Scope About This ManualHow to Print this Manual How to Use This ManualXix Page Chapter Introduction Key Features of the Netgear ProSafe DGFV338Full Routing on Both the Adsl and 10/100 WAN Port Powerful, True Firewall with Content FilteringSecurity Virtual Private Networking VPNAutosensing Ethernet Connections with Auto Uplink Extensive Protocol Support Easy Installation and ManagementSystem Requirements Maintenance and SupportHardware Description Package ContentsNos LEDs Activity Description Object DescriptionsRouter Rear Panel Enter http//192.168.1.1 as the URL Router Login Factory DefaultsPlacement of your Netgear ProSafe DGFV338 Chapter Basic Installation and Configuration Using Adsl Microfilters optional Logging in and Configuring your Internet Connection Configuring Your Internet Connection using Auto Detect V1.0, April Internet Service Connections Manually Configuring your Adsl ConnectionEnter your Internet IP Address Manually Configuring your Ethernet Connection V1.0, April Enter your Internet IP Address V1.0, April V1.0, April V1.0, April Configuring the WAN Mode Use Dedicated WAN port V1.0, April On the Internet Configuring Dynamic DNS If NeededV1.0, April DynDNS Service Screen Traffic Meter Adsl Programming the Traffic MeterParameter Description Traffic Meter ParametersV1.0, April Implementing Wireless Security Chapter Wireless ConfigurationLUHOHVVDWD 6HFXULW\2SWLRQV Understanding Wireless Settings Wireless Access Point Wireless LANsV1.0, April Access Control List Advanced Wireless Router Settings Wireless Advanced OptionsWPA-PSK or WPA2-PSK Pre-Shared Key WEP and WPA/WPA2 Wireless Security Check List FormConfiguring Your Wireless Settings Configuring WEP V1.0, April Configuring WPA-PSK Configuring WPA2-PSK Configuring WPA-PSK and WPA2-PSK Configuring WPA with Radius Configuring WPA2 with Radius Configuring WPA and WPA2 with Radius Restricting Wireless Access by MAC Address V1.0, April V1.0, April Using Rules to Block or Allow Specific Kinds of Traffic Firewall Protection and Content Filtering OverviewAbout Service Based Rules Outbound Rules Service Blocking V1.0, April V1.0, April V1.0, April Outbound Rule Example Blocking Instant Messenger Inbound Rules Port ForwardingV1.0, April V1.0, April V1.0, April V1.0, April Inbound Rule Example a Local Public Web Server Inbound Rule Example One-to-One NAT Mapping V1.0, April Inbound Rule Example Exposed Host Considerations for Inbound Rules Order of Precedence for Rules Customized ServicesV1.0, April Outbound Rules Add Screen Quality of Service QoS PrioritiesWAN Security Checks Attack ChecksManaging Groups and Hosts V1.0, April V1.0, April Groups and Hosts Blocking Internet SitesV1.0, April V1.0, April Enabling Source MAC Filtering Setting up Port Triggering V1.0, April Port triggering Setting a Schedule to Block or Allow Specific Traffic Event Logs and Alerts V1.0, April V1.0, April Security and Administrator Management V1.0, April IP addressing requirements for VPNs in dual WAN port systems Dual WAN Port SystemsSetting up a VPN Connection using the VPN Wizard V1.0, April V1.0, April IKE Policy VPN Tunnel PoliciesIKE Policy Table Managing IKE PoliciesManaging VPN Policies VPN PolicyVPN Policy Table VPN Tunnel Connection StatusCreating a VPN Connection Between FVX538 and DGFV338 Configuring the ProSafe DGFV338V1.0, April V1.0, April V1.0, April V1.0, April Configuring the FVX538 Testing the Connection Configuring the DGFV338Creating a VPN Client Connection VPN Client to DGFV338 V1.0, April Configuring the VPN Client Todgfv Left frame, select Security Policy Todgfv Testing the Connection Certificate Authorities Generate Self Certificate Request, enter the required data Generating a Self Certificate RequestV1.0, April Managing your Certificate Revocation List CRL Uploading a Trusted CertificateUpload Extended Authentication Xauth ConfigurationConfiguring Xauth for VPN Clients V1.0, April User Database Configuration Radius Client Configuration Enter the Primary Radius Server IP address Mode Config Operation Manually Assigning IP Addresses to Remote Users ModeConfigConfiguring the ProSafe DGFV338 V1.0, April V1.0, April Configuring the ProSafe VPN Client for ModeConfig V1.0, April V1.0, April V1.0, April V1.0, April Performance Management Wireless Firewall Features That Reduce TrafficService Blocking Block Sites Wireless Firewall Features That Increase Traffic Source MAC FilteringPort Forwarding V1.0, April Using QoS to Shift the Traffic Mix Port TriggeringVPN Tunnels Administrator and Guest Access Authorization Changing the Passwords and Login Time-outTools for Traffic Management Enabling Remote Management Access Under Allow Remote Management, check the Yes radio box Https//172.21.4.18080 Command Line InterfaceTraffic Limits Reached Event AlertsRouter Status MonitoringRouter Status WAN Ports Internet Traffic V1.0, April Known PCs and Devices LAN Ports and Attached DevicesKnown PCs and Devices table Dhcp LogFirewall Security Port Triggering StatusPort Triggering Status data V1.0, April VPN Tunnels VPN Status Data Using a Snmp ManagerV1.0, April Diagnostics Diagnostics Configuration File Management Settings Backup and Firmware UpgradeBackup and Restore Settings Click default Router Upgrade To upgrade router software Setting the Time ZoneV1.0, April Using the Firewall as a Dhcp server Chapter LAN ConfigurationSecurity and Firewall Protection Configuring the LAN Setup OptionsUsing Address Reservation Configuring Multi Home LAN IPs V1.0, April Gateway IP and DNS server IPs Adding or Editing a Static Route Configuring Static RoutesRouting Information Protocol RIP V1.0, April Static Route Example Enabling Universal Plug and Play UPnPSettings Description UPnP Portmap Table settingsV1.0, April Basic Functions Power LED Not OnTroubleshooting the Web Configuration Interface LEDs Never Turn OffLAN or Internet Port LEDs Not On Troubleshooting the ISP Connection V1.0, April Testing the LAN Path to Your Firewall Troubleshooting a TCP/IP Network Using a Ping UtilityPing -n 10 IP address Testing the Path from Your PC to a Remote DeviceProblems with Date and Time Restoring the Default Configuration and PasswordV1.0, April Table A-1. Default Configuration Settings Default Factory SettingsFeature Default Behavior Table A-2. Technical Specifications Technical SpecificationsSpecification Description Electromagnetic Emissions Appendix B Related Documents V1.0, April Numerics IndexIndex-2 Index-3 Index-4 Index-5 Index-6 Index-7 Index-8
Related manuals
Manual 10 pages 13.59 Kb