FVS338 ProSafe VPN Firewall 50 Reference Manual

by MAC address

Source MAC filtering 4-23

firewall

alerts, emailing of 4-27connecting 2-1, 2-2features 1-2

logging in to 2-1rear panel 1-7security, about 4-1status 6-22

technical specifications A-1

firewall access

remote management 6-9

Firewall Logs configuring 4-28emailing of 4-27

Firewall Logs & E-mail screen 4-27, 6-18firewall protection 4-1

firewall rules about 4-1ordering 4-6

firmware upgrade 6-12

FQDN

use in VPN tunnels 5-1

G

Gateway VPN Tunnel setting up 5-2

gateway-to-gateway

VPN Tunnel, example of 5-8Generate Self Certificate Request 5-34

Group Names 3-7editing 3-7

Groups managing 3-5

rules, covered by 6-3

Groups and Hosts

About 3-5

Groups and Hosts screen 3-6, 3-7, 6-20

H

Host Exclusion List

Trend Micro, use with 3-13

I

ICMP Destination Unreachable 4-11

IKE Policies

auto, rules of 5-4field definitions 5-5manual, rules of 5-4

use with ModeConfig 5-27IKE Policies screen 5-9, 5-10

IKE/ISAKMP

use in IKE Policy 5-5

Inbound Rules 4-2about 4-4configuring DHCP 4-4examples of 4-12Fields, definition of 4-5firewall 4-1

Port Forwarding 4-4

Increased Traffic Port Triggering 6-6

Increased traffic

Port Forwarding 6-4VPN tunnels 6-6

installation 1-4

Internet

configuring the connection manually 2-9connection configuration 2-2

traffic information 6-25Internet Protocol Numbers 4-17

IP Address LAN Setup 3-2

rules with VPN tunnels 5-2

IP Address Pool LAN Setup 3-3

use with ModeConfig 5-26

IP addresses auto-generated 7-3reserved 3-8

IP Addressing Requirements VPNs, use in Dual WAN Ports 5-1

IP Subnet Mask LAN Setup 3-2

Index-3

v1.0, September 2006

Page 173
Image 173
NETGEAR FVS338 manual Index-3