Contents ix
v1.0, March 2008
Setting Block Sites (Content Filtering) .......................................................................... 4-22
Enabling Source MAC Filtering ....................................................................................4-24
IP/MAC Binding ............................................................................................................4-26
Setting Up Port Triggering ............... ... ... ... ....................................................................4-28
Bandwidth Limiting ...................... .... ... ... ... .... ... ... ... ................ .... ... ... ... .... ................ ... ...4-30
E-Mail Notifications of Event Logs and Alerts .................. .......................... ...................4-32
Administrator Information .............................................................................................4-36
Chapter 5
Virtual Private Networking
Dual WAN Port Systems .................................................................................................5-1
Setting up a VPN Connection using the VPN Wizard .....................................................5-2
Creating a VPN Tunnel to a Gateway ......................................................................5-2
Creating a VPN Tunnel Connection to a VPN Client .......... ... ... ... .... ................ ... ... ..5-3
IKE Policies ..................................... ... ... ... ................ .... ... ... ................ .... ... ... ..................5-4
IKE Policy Operation ................. ... ... ... .... ... ... ... ... ................. ... ... ... .... ... ... ... ... .... ... ... ..5-4
IKE Policy Table .................... .... ... ... ................ ... .... ... ... ................ .... ... ... ... ... ............5-4
VPN Policies ................ ... .... ... ................ ... .... ... ................ ... ... .... ................ ... ... ... ............5-5
VPN Policy Operation .. ... ... ... .... ... ... ................ ... .... ... ... ... .... ... ... ... .... ... ................ ... ..5-6
VPN Policy Table ................ ... .... ................ ... ... ... .... ... ................ ... .... ... ... ... ...............5-6
VPN Tunnel Connection Status ................................................................................5-7
Creating a VPN Gateway Connection: Between FVS338 and FVX538 .........................5-8
Configuring the FVS338 ...........................................................................................5-8
Configuring the FVX538 .........................................................................................5-11
Testing the Connection ...........................................................................................5-12
Creating a VPN Client Connection: VPN Client to FVS338 ............. ... .... ... ... ... ... .... ... ...5-12
Configuring the FVS338 .........................................................................................5-13
Configuring the VPN Client .................... ... ... ... ................ .... ... ... ... .... ... ... ... .............5-14
Testing the Connection ...........................................................................................5-19
Extended Authentication (XAUTH) Configuration ..... .................... ................... .............5-20
Configuring XAUTH for VPN Clients ......................................................................5-21
User Database Configuration ....... ... ... .... ... ... ... ... .... ... ... ... .... ................ ... ... ... .... ... ...5-22
RADIUS Client Configuration .................................................................................5-23
Manually Assigning IP Addresses to Remote Users (ModeConfig) .......................... ...5-25
ModeConfig Operation ...........................................................................................5-26
Setting Up ModeConfig ...... ... .... ... ... ... .... ... ... ..........................................................5-26