ProSafe VPN Firewall 200 FVX538 Reference Manual

Index-9

v1.0, August 2006
definitions 2-9
Trend Micro
enabling 3-15
Office Scan Server 3-16
OfficeS c an client, exclusion list 3-16
requirements for use 3-15
Trend Micro integration 1-4
Trend Micro screen 3-16
Trend Micro security 1-4
troubleshooting 7-1
browsers 7-3
configuration settings, using snif fer 7-3
defaults 7-3
ISP connection 7-4
NTP 7-7
testing your setup 7-6
Web configuration 7-2
Trusted Certificates 5-27
Trusted Domains
building list of 4-26
TZO.com 2-15

U

UDP flood 4-15
Use Default Address 2-5
User Database 5-32
adding user 5-34
editing user 5-35
User Database screen 5-34

V

view protocol bindings
Load Balancing 2-13
viewing logs 6-19
VPN
gateway to gateway, about C-14
gateway-to-gateway, Dual gateway C-15
gateway-to-gateway, single gateway C-14
Load Balancing, examples of C-11
load balancing, with dual WAN ports C-7
Road Warrior, dual gateway C-12
Road Warrior, examples of C-11
Road Warrior, single gateway C-12
Rollover, examples of C-10
rollover, with dual WAN ports C-7
telecommuter, about C-17
telecommuter, Dual gateway C-18
telecommuter, single gateway C-18
VPN Client
configuring 5-7
configuring PC, example 5-22
VPN Wizard example 5-20
VPN firewall
connecting 2-1
VPN Logs
monitoring 6-26
VPN Logs screen 6-26
VPN Pass through 4-15
VPN Policies screen 5-5, 5-9
VPN Policy
Auto 5-12
Auto generated 5-10
field definitions 5-13
Manual 5-12
VPN Tunnel
Client Policy 5-7
FVS338, configuring, example of 5-19
FVX538 configuration, example 5-14
load balancing mode 5-1
rollover mode 5-1
VPN Tunnel addresses
Dual WAN Port systems 5-1
VPN Tunnel Connection
monitoring status 6-25
VPN Tunnels
Connection Status 5-13
increasing traffic 6-7
L2TP 4-15
VPN tunnels
about 5-1
IPsec 4-15
PPTP 4-15
VPN Wizard
Gateway tunnel 5-4
VPN Client, configuring 5-7
VPN Wizard Default Values 5-5