January 2005
vi Contents
Using the Smart Setup Wizard .....................................................................................3-11
How to Manually Configure Your Internet Connection .................................................. 3-12
Chapter 4
Firewall Protection and
Content Filtering
Firewall Protection and Content Filtering Overview ................... ... ... ... .... ... ... ... ... .... ... ... ..4-1
Block Sites ......................................................................................................................4-2
Using Rules to Block or Allow Specific Kinds of Traffic ..................................................4-3
Inbound Rules (Port Forwarding) .............................................................................4-5
Inbound Rule Example: A Local Public Web Server ..........................................4-5
Inbound Rule Example: Allowing a Videoconference from Restricted Addresses 4-6
Considerations for Inbound Rules .....................................................................4-6
Outbound Rules (Service Blocking) .........................................................................4-7
Outbound Rule Example: Blocking Instant Messenger .....................................4-7
Order of Precedence for Rules ................................................................................4-8
Default DMZ Server .................................................................................................4-8
Respond to Ping on Internet WAN Port ...................................................................4-9
Services ........................................................................................................................4-10
Using a Schedule to Block or Allow Specific Traffic ...................... ................ ................4-12
Time Zone ..............................................................................................................4-13
Getting E-Mail Notifications of Event Logs and Alerts ..................................................4-14
Viewing Logs of Web Access or Attempted Web Access .............................................4-16
Syslog ....................................................................................................................4-17
Chapter 5
Basic Virtual Private Networking
Overview of VPN Configuration ......................................................................................5-2
Client-to-Gateway VPN Tunnels ..............................................................................5-2
Gateway-to-Gateway VPN Tunnels .........................................................................5-2
Planning a VPN ..............................................................................................................5-3
VPN Tunnel Configuration ..... ... ... .... ... ... ... ................ .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ..5-5
How to Set Up a Client-to-Gateway VPN Configuration .................................................5-5
Step 1: Configuring the Client-to-Gateway VPN Tunnel on the FVS318v3 ..............5-6
Step 2: Configuring the NETGEAR ProSafe VPN Client on the Remote PC ...........5-9
Monitoring the Progress and Status of the VPN Client Connection .......................5-16
Transferring a Security Policy to Another Client ................. ... ... ... .... ... ... ... ... .... ... ...5-18
Exporting a Security Policy .... ... ................ ... .... ... ... ... .... ... ... ... .... ... ................ ...5-18