NETGEAR FVG318 Reference Manual page 8

Prosafe 802.11g wireless vpn firewall
Hide thumbs Also See for FVG318:
Table of Contents

Advertisement

ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
Chapter 3
Observing Performance, Placement, and Range Guidelines .........................................3-1
Implementing Appropriate Wireless Security ..................................................................3-2
Understanding Wireless Settings ...................................................................................3-3
Security Check List for SSID and WEP Settings ......................................................3-7
Setting Up and Testing Basic Wireless Connectivity ................................................3-8
Restricting Wireless Access by MAC Address .........................................................3-9
Configuring WEP Security Settings ........................................................................3-10
Configuring WPA with RADIUS ..............................................................................3-12
Configuring WPA2 with RADIUS ............................................................................3-14
Configuring WPA and WPA2 with RADIUS ............................................................3-15
Configuring WPA-PSK ...........................................................................................3-17
Configuring WPA2-PSK .........................................................................................3-18
Configuring WPA-PSK and WPA2-PSK .................................................................3-20
Chapter 4
Firewall Protection and Content Filtering Overview ........................................................4-1
Block Sites ......................................................................................................................4-1
Using Rules to Block or Allow Specific Kinds of Traffic ..................................................4-4
Inbound Rules (Port Forwarding) .............................................................................4-6
Outbound Rules (Service Blocking) .........................................................................4-8
Order of Precedence for Rules ................................................................................4-9
Default DMZ Server ...............................................................................................4-10
Attack Checks ........................................................................................................ 4-11
Services ........................................................................................................................4-12
Using a Schedule to Block or Allow Specific Traffic ......................................................4-13
Getting E-Mail Notifications of Firewall Logs ................................................................4-14
Chapter 5
Overview of VPN Configuration ......................................................................................5-2
Client-to-Gateway VPN Tunnels ..............................................................................5-2
Gateway-to-Gateway VPN Tunnels .........................................................................5-2
Planning a VPN ..............................................................................................................5-3
VPN Tunnel Configuration ..............................................................................................5-4
viii
v1.0, September 2007
Contents

Advertisement

Table of Contents
loading

Table of Contents