Table of ContentsPreviousNextSearch Knowledge Base

Complete PDF manual


  Table of Contents

Reference Manual for the ProSafe VPN Firewall 200 FVX538

Chapter 1 About This Manual

Audience, Scope, Conventions, and Formats

How to Use This Manual

How to Print this Manual

Chapter 2 Introduction

Key Features of the VPN Firewall

Dual WAN Ports for Increased Reliability or Outbound Load Balancing

A Powerful, True Firewall with Content Filtering

Trend Micro Integration

Security

Autosensing Ethernet Connections with Auto Uplink

Extensive Protocol Support

Easy Installation and Management

Maintenance and Support

Package Contents

The Router's Front Panel

The Router's Rear Panel

Rack Mounting the Router

The Router's IP Address, Login Name, and Password

How to Log in

Default Factory Settings

Chapter 3 Connecting the FVX538 to the Internet

Connecting the FVX538 ProSafe VPN Firewall 200

Step 1: Connect the VPN Firewall to Your Network

Step 2: Log in to the VPN Firewall

Step 3: Configure the Internet Connections to Your ISPs

Manually Configuring Your Internet Connection

Programming the Traffic Meter (if Desired)

Step 4: Configure the WAN Mode (Required for Dual WAN)

Rollover Setup

Parameter Definitions for Auto-Rollover

Load Balancing and Protocol Binding Setup

Step 5: Configure Dynamic DNS (If Needed)

Step 6: Configure the WAN Options (If Needed)

Chapter 4 LAN Configuration

Using the LAN IP Setup Options

Configuring LAN TCP/IP Setup Parameters

Using the Firewall as a DHCP server

Using Address Reservation

Multi Home LAN IPs

DMZ Setup

Step 1: Enable the DMZ port

Step 2: Define the DMZ port rules

Configuring Static Routes

To Add or Edit a Static Route

Static Route Example

Enabling Trend Micro Antivirus Enforcement

RADIUS Client Configuration

Chapter 5 Firewall Protection and Content Filtering

Using Rules to Block or Allow Specific Kinds of Traffic

Services-Based Rules

Inbound Rules (Port Forwarding)

To configure the FVX538 for additional IP addresses:

Outbound Rules (Service Blocking)

Customized Services

Quality of Service (QoS) Priorities

Managing Groups and Hosts

Advantages of the Network Database are as follows:

Using a Schedule to Block or Allow Specific Traffic

Time Zone

Block Sites

Source MAC Filtering

Port Triggering

Getting E-Mail Notifications of Event Logs and Alerts

Emailing logs:

Syslog

Viewing Logs of Web Access or Attempted Web Access

Administrator Information

Chapter 6 Virtual Private Networking

Dual WAN Port Systems

Rollover vs. Load Balancing Mode

Fully Qualified Domain Names

Creating a VPN Connection: Between FVX538 and FVX538

Configuring the FVX538

Configuring the FVS338

Testing the Connection

Creating a VPN Connection: Netgear VPN Client to FVX538

Configuring the FVX538

Configuring the VPN Client

Testing the Connection

Chapter 7 Router and Network Management

Performance Management

Bandwidth Capacity

VPN Firewall Features That Reduce Traffic

Service Blocking

Block Sites

Source MAC Filtering

VPN Firewall Features That Increase Traffic

Port Forwarding

Port Triggering

DMZ Port

VPN Tunnels

Using QoS to Shift the Traffic Mix

Tools for Traffic Management

Administrator and Guest Access Authorization

Changing the Passwords and Login Time-out

Enabling Remote Management Access

To configure your firewall for Remote Management:

Command Line Interface

Event Alerts

WAN Port Rollover

Traffic Limits Reached

Login Failures and Attacks

Monitoring

Viewing VPN Firewall Status and Time Information

Firewall Status

Time Information

WAN Ports

WAN Port Connection Status

Dynamic DNS Status

Internet Traffic Information

LAN Ports and Attached Devices

Known PCs and Devices

DHCP Log

Port Triggering Status

Firewall Security

VPN Tunnels

SNMP

Diagnostics

Configuration File Management

Restoring and Backing Up the Configuration

Upgrading the Firewall Software

Erasing the Configuration (Factory Defaults Reset)

Chapter 8 Troubleshooting

Basic Functioning

Power LED Not On

LEDs Never Turn Off

LAN or Internet Port LEDs Not On

Troubleshooting the Web Configuration Interface

Troubleshooting the ISP Connection

Troubleshooting a TCP/IP Network Using a Ping Utility

Testing the LAN Path to Your Firewall

Testing the Path from Your PC to a Remote Device

Restoring the Default Configuration and Password

Problems with Date and Time

Appendix A Technical Specifications

Appendix B Network Planning

What You Will Need to Do Before You Begin

Cabling and Computer Hardware Requirements

Computer Network Configuration Requirements

Internet Configuration Requirements

Where Do I Get the Internet Configuration Parameters?

Record Your Internet Connection Information

Overview of the Planning Process

Inbound Traffic

Virtual Private Networks (VPNs)

The Roll-over Case for Firewalls With Dual WAN Ports

The Load Balancing Case for Firewalls With Dual WAN Ports

Inbound Traffic

Inbound Traffic to Single WAN Port (Reference Case)

Inbound Traffic to Dual WAN Port Systems

Inbound Traffic: Dual WAN Ports for Improved Reliability

Inbound Traffic: Dual WAN Ports for Load Balancing

Virtual Private Networks (VPNs)

VPN Road Warrior (Client-to-Gateway)

VPN Road Warrior: Single Gateway WAN Port (Reference Case)

VPN Road Warrior: Dual Gateway WAN Ports for Improved Reliability

VPN Road Warrior: Dual Gateway WAN Ports for Load Balancing

VPN Gateway-to-Gateway

VPN Gateway-to-Gateway: Single Gateway WAN Ports (Reference Case)

VPN Gateway-to-Gateway: Dual Gateway WAN Ports for Improved Reliability

VPN Gateway-to-Gateway: Dual Gateway WAN Ports for Load Balancing

VPN Telecommuter (Client-to-Gateway Through a NAT Router)

VPN Telecommuter: Single Gateway WAN Port (Reference Case)

VPN Telecommuter: Dual Gateway WAN Ports for Improved Reliability

VPN Telecommuter: Dual Gateway WAN Ports for Load Balancing

Appendix C Related Documents


NETGEAR, Inc.
http://www.netgear.com
Table of ContentsPreviousNextSearch Knowledge Base