x
v1.0, August 2006
Configuring the VPN Client ................ .... ... ... ... ... .... ... ... .................... ... ... ... ... .... ... ...5-22
Testing the Connection ...........................................................................................5-26
Certificate Authorities ...................................................................................................5-27
Generating a Self Certificate Request ....................................................................5-28
Uploading a Trusted Certificate ..............................................................................5-30
Managing your Certificate Revocation List (CRL) ........... .......................................5-30
Extended Authentication (XAUTH) Configuration ..... .................... ................... .............5-31
Configuring XAUTH for VPN Clients ......................................................................5-32
User Database Configuration ................................. ... ... ... .... ................... ... ... .... ... ...5-34
RADIUS Client Configuration .................................................................................5-35
Manually Assigning IP Addresses to Remote Users (ModeConfig) ................... .... ... ...5-37
Mode Config Operation ................... ... .... ... ................... ... .... ... ................... ... .... ......5-37
Configuring the VPN Firewall ....................... ... ... .... ... ... ... .... ... ................... ... .... ... ...5-38
Configuring the ProSafe VPN Client for ModeConfig ................... ....... ...... ....... ......5-41
Chapter 6
Router and Network Management
Performance Management .... ... ... .... ... ... ... .... ... ... ... ... .... ................... ... .... ... ... ... ...............6-1
Bandwidth Capacity ..................... ... ... .... ... ... ... ... .................... ... ... .................... ... ... ..6-1
VPN Firewall Features That Reduce Traffic .............................................................6-2
Service Blocking ....................... ... .................... ... ... .................... ... ... ..................6-2
Block Sites .........................................................................................................6-4
Source MAC Filtering ........................................................................................6-4
VPN Firewall Features That Increase Traffic ...........................................................6-5
Port Forwarding ........................... .... ... ... ... .................... ... ... ... .... ... ................... ..6-5
Port Triggering .................... ... ... ... .... ................... ... ... .................... ... ..................6-6
DMZ Port ...........................................................................................................6-7
VPN Tunnels ...... .... ... ... ... .... ... ... ................... .... ... ................... .... ... ... ..................6-7
Using QoS to Shift the Traffic Mix ............................................................................6-7
Tools for Traffic Management ....................... ... ... .................... ... ... .................... ... ... ..6-8
Administration .................................................................................................................6-8
Changing Passwords and Settings ..........................................................................6-8
Enabling Remote Management Access .................................................................6-10
Using a SNMP Manager ........................................................................................6-11
Settings Backup and Firmware Upgrade ...............................................................6-13
Backup and Restore Settings ..........................................................................6-14