ix
v1.0, August 2006
Inbound Rules Examples .......................................................................................4-16
LAN WAN Inbound Rule: Hosting A Local Public Web Server ........................4-16
LAN WAN Inbound Ru le: Allowing Videoconference from Restricted Addresses 4-17
LAN WAN or DMZ WAN Inbound Rule: Setting Up One-to-One NAT Mapping 4-17
LAN WAN or DMZ WAN Inbound Rule: Specifying an Exposed Host .............4-19
Outbound Rules Example ......... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ................ ... ... .... ... ...4-20
LAN WAN Outbound Rule: Blocking Instant Messenger .................................4-20
Adding Customized Services ............. .... ................................................................4-21
Setting Quality of Service (QoS) Priorities .............................................................4-23
Setting a Schedule to Block or Allow Specific Traffic .... ... ................ ... .... ... ... ... ... .... ... ...4-24
Setting Block Sites (Content Filtering) .......................................................................... 4-25
Enabling Source MAC Filtering ....................................................................................4-27
Port Triggering .... ... ... ... ... .... ... ... ................ .... ... ... ... ................ .... ... ... ... ................ .... ... ...4-28
E-Mail Notifications of Event Logs and Alerts .................. .......................... ...................4-31
Administrator Tips .........................................................................................................4-35
Chapter 5
Virtual Private Networking
Dual WAN Port Systems .................................................................................................5-1
Setting up a VPN Connection using the VPN Wizard .....................................................5-3
Creating a VPN Tunnel to a Gateway ......................................................................5-4
Creating a VPN Tunnel Connection to a VPN Client ................... ................ .... ... ... ..5-7
VPN Tunnel Policies ....... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... ................. ... ... ... ... .... ... ...5-10
IKE Policy ................. .... ... ... ... .... ................ ... ... ................ .... ... ... ................ ... .... ......5-10
Managing IKE Policies ........ ... ... ... .... ... ... ... ... ................. ... ... ... .... ... ... ... ... .... ... ...5-11
IKE Policy Table ..... ... ................ ... .... ... ... ................ ... .... ... ... ................ ... .... ... ...5-11
VPN Policy ...... ... ... ... .... ... ................ ... .... ................ ... ... ................ .... ... ................ ...5-12
Managing VPN Policies ................... ... ... ... ... .... ... ... ... .... ... ... ... ................ .... ... ...5-12
VPN Policy Table ................ ... ... ................ ... .... ... ................ ... .... ................ ... ...5-13
VPN Tunnel Connection Status ..............................................................................5-13
Creating a VPN Gateway Connection: Between FVX538 and FVS338 .......................5-14
Configuring the FVX538 .........................................................................................5-14
Configuring the FVS338 .........................................................................................5-19
Testing the Connection ...........................................................................................5-20
Creating a VPN Client Connection: VPN Client to FVX538 .......... ... ....... ... ... ... ... .... ... ...5-20
Configuring the FVX538 .........................................................................................5-20