ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
xii
v1.2, June 2008
Restoring the Default Configuration and Password ......................................................10-7
Problems with Date and Time .......................................................................................10-7
Using the Diagnostics Utilities ............ ..........................................................................10-8
Appendix A
Default Settings and Technical Specifications
Appendix B
Related Documents
Appendix C
Network Planning for Dual WAN Ports
What You Will Need to Do Before You Begin ................................................................ C-1
Cabling and Computer Hardware Requirements ................................... ................. C-3
Computer Network Configuration Requirements ......... ... .... ... ... ... .... ... ... ... ... .... ... ... . C-3
Internet Configuration Requirements ...................................................................... C-4
Where Do I Get the Internet Configuration Parameters? ........................................ C-4
Internet Connection Information Form ......... ........................................................... C-5
Overview of the Planning Process ................................................................................. C-6
Inbound Traffic ....................................... ................................................................. C-6
Virtual Private Networks (VPNs) ............................... .............................................. C-6
The Roll-over Case for Firewalls With Dual WAN Ports .......................................... C-7
The Load Balancing Case for Firewalls With Dual WAN Ports ............................... C-7
Inbound Traffic ............................................................................................................... C-8
Inbound Traffic to Single WAN Port (Reference Case) ........................................... C-8
Inbound Traffic to Dual WAN Port Systems ........................................................ .... C-8
Virtual Private Networks (VPNs) .................................................................................. C-10
VPN Road Warrior (Client-to-Gateway) .................... ............................................ C-11
VPN Gateway-to-Gateway ........................................................................... ......... C-14
VPN Telecommuter (Client-to-Gateway Through a NAT Router) ..........................C-17
Index