Table of Contents
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 5
Packet Filters................................................................................................................................................................. 101
Packet Filters > Packet Filter Rules......................................................................................................................101
Packet Filters > ICMP...........................................................................................................................................103
Packet Filters > Advanced....................................................................................................................................104
Packet Filters > Enable/Disable Log.....................................................................................................................105
VPN (Virtual Private Networks)......................................................................................................................................106
VPN > IPSec.........................................................................................................................................................106
Introduction to Virtual Private Networks................................................................................................................106
VPN > x.509 Certificates.......................................................................................................................................111
VPN > IPSec Bridging.......................................................................................................................................... 111
VPN > PPTP.........................................................................................................................................................112
Wizard Setup................................................................................................................................................................. 114
Statistics & Logs............................................................................................................................................................ 116
Statistics & Logs > Uptime....................................................................................................................................117
Statistics and Logs > Hardware............................................................................................................................117
Statistics and Logs > Networks.............................................................................................................................118
Statistics & Logs > Interfaces...............................................................................................................................120
Statistics & Logs > SMTP Proxy...........................................................................................................................121
Statistics & Logs > Accounting.............................................................................................................................122
Statistics & Logs > Self Monitor............................................................................................................................123
Statistics & Logs > IPSec......................................................................................................................................124
Statistics & Logs > PPTP......................................................................................................................................124
Statistics & Logs > Packet Filter...........................................................................................................................125
Statistics & Logs > Port Scans..............................................................................................................................126
Statistics & Logs > View Logs...............................................................................................................................126
Statistics & Logs > HTTP Access.........................................................................................................................127
Statistics & Logs > DHCP.....................................................................................................................................128
Statistics & Logs > SMTP & POP3 Virus Quarantines..........................................................................................129
Statistics & Logs > SMTP SPAM Quarantines......................................................................................................129
Statistics & Logs > Administrative Authentication Log..........................................................................................129
Chapter 7 – User Authentication Methods......................................................................................................130
Proxy Services and Authentication Methods ........................................................................................................130
Which Method Should You Choose?....................................................................................................................130
Authentication Setup......................................................................................................................................................131
Setting Up RADIUS Authentication.......................................................................................................................131
Setting Up A Microsoft IAS RADIUS Server.........................................................................................................131
Setting Up NT/2000 SAM (SMB) Authentication...................................................................................................132
Chapter 8 – Frequently Asked Questions (FAQs)..........................................................................................133
Chapter 9 – Troubleshooting........................................................................................................................... 139
Appendix A – Disposition of Events for the RouteFinder v3.2x...................................................................141
1. Abstract..................................................................................................................................................................... 142
II. Inbound Access Log.................................................................................................................................................. 143
III. Outbound Access Log.............................................................................................................................................. 145
IV. Access Requests through Firewall Dropped............................................................................................................ 146
V. Access Requests to Firewall Dropped.......................................................................................................................146
VI. Administrative Authentication Logs.......................................................................................................................... 147
VII. Admin Port Access Log........................................................................................................................................... 147
VIII. Startup History Log.................................................................................................................................................147
IX. User Log...................................................................................................................................................................147