Netgear FVS318v3 – Cable/DSL ProSafe VPN Firewall with 8-Port Switch Reference Manual
ProSafe VPN Firewall FVS318v3 Reference Manual
Advanced Configuration
7-7
v5.0, January 2012
•
Your company’s network is 134.177.0.0.
When you first configured your firewall, two implicit static routes were created. A default route
was created with your ISP as the gateway, and a second static route was created to your local
network for all 192.168.0.x addresses. With this configuration, if you attempt to access a device on
the 134.177.0.0 network, your firewall will forward your request to the ISP. The ISP forwards your
request to the company where you are employed, and the request will likely be denied by the
company’s firewall.
was created with your ISP as the gateway, and a second static route was created to your local
network for all 192.168.0.x addresses. With this configuration, if you attempt to access a device on
the 134.177.0.0 network, your firewall will forward your request to the ISP. The ISP forwards your
request to the company where you are employed, and the request will likely be denied by the
company’s firewall.
In this case you must define a static route, telling your firewall that 134.177.0.0 should be accessed
through the ISDN firewall at 192.168.0.100. The static route would look like
through the ISDN firewall at 192.168.0.100. The static route would look like
In this example:
•
The Destination IP Address and IP Subnet Mask fields specify that this static route applies to
all 134.177.x.x addresses.
all 134.177.x.x addresses.
•
The Gateway IP Address fields specifies that all traffic for these addresses should be
forwarded to the ISDN firewall at 192.168.0.100.
forwarded to the ISDN firewall at 192.168.0.100.
•
A Metric value of 1 will work since the ISDN firewall is on the LAN.
•
Private is selected only as a precautionary security measure in case RIP is activated.
Enabling Remote Management Access
Using the Remote Management page, you can allow a user or users on the Internet to configure,
upgrade and check the status of your VPN firewall.
upgrade and check the status of your VPN firewall.
To configure your firewall for Remote Management:
1. Select the Turn Remote Management On check box.
2. Specify what external addresses will be allowed to access the firewall’s remote management.
Note: For enhanced security, restrict access to as few external IP addresses as practical.
a. To allow access from any IP address on the Internet, select Everyone.
Note: Be sure to change the firewall’s default configuration password to a very secure
password. The ideal password should contain no dictionary words from any
language, and should be a mixture of letters (both upper and lower case), numbers,
and symbols. Your password can be up to 30 characters.
language, and should be a mixture of letters (both upper and lower case), numbers,
and symbols. Your password can be up to 30 characters.