ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
viii Contents
v1.0, September 2007
Chapter 3
Configuring Wireless Connectivity
Observing Performance, Placement, and Range Guidelines .................... .....................3-1
Implementing Appropriate Wireless Security .................................................................. 3-2
Understanding Wireless Settings ................................................................................... 3-3
Security Check List for SSID and WEP Settings ......................................................3-7
Setting Up and Testing Basic Wireless Connectivity ................................................3-8
Restricting Wireless Access by MAC Address ......................................................... 3-9
Configuring WEP Security Settings ........................................................................ 3-10
Configuring WPA with RADIUS .............................................................................. 3-12
Configuring WPA2 with RADIUS ............................................................................ 3-14
Configuring WPA and WPA2 with RADIUS ............................................................3-15
Configuring WPA-PSK . ..........................................................................................3-17
Configuring WPA2-PSK ......................................................................................... 3-18
Configuring WPA-PSK and WPA2-PSK .................................................................3-20
Chapter 4
Firewall Protection and Content Filtering
Firewall Protection and Content Filtering Overview ........................................................ 4-1
Block Sites .......................................................... ............................................................4-1
Using Rules to Block or Allow Specific Kinds of Traffic ............. .....................................4-4
Inbound Rules (Port Forwarding) ............................................................................. 4-6
Outbound Rules (Service Blocking) ....... ..................................................................4-8
Order of Precedence for Rules ................................................................................ 4-9
Default DMZ Server ............................................................................................... 4-10
Attack Checks .......... .... ... ... ... ................................................................................. 4-11
Services ........................................................................................................ ................4-12
Using a Schedule to Block or Allow Specific Traffic ......................................................4-13
Getting E-Mail Notifications of Firewall Logs ................... .............................................4-14
Chapter 5
Basic Virtual Private Networking
Overview of VPN Configuration ................................................. .....................................5-2
Client-to-Gateway VPN Tunnels ..............................................................................5-2
Gateway-to-Gateway VPN Tunnels .........................................................................5-2
Planning a VPN .. ............................................................................................................ 5-3
VPN Tunnel Configuration ...................................................................... ... ... ... ... .... ... ... .. 5-4