참조 매뉴얼차례Reference Manual for the ProSafe Dual Band Wireless VPN Firewall FWAG1141Contents5Chapter 1 About This Manual11Audience11Typographical Conventions11Special Message Formats11Features of the HTML Version of this Manual12Chapter 2 Introduction13Key Features of the VPN Firewall13802.11g and 802.11b Wireless Networking14A Powerful, True Firewall with Content Filtering14Security15Autosensing Ethernet Connections with Auto Uplink15Extensive Protocol Support15Easy Installation and Management16Maintenance and Support17Package Contents17The FWAG114’s Front Panel18Chapter 3 Connecting the FWAG114 to the Internet21What You Will Need Before You Begin21Cabling and Computer Hardware Requirements21Computer Network Configuration Requirements21Internet Configuration Requirements22Where Do I Get the Internet Configuration Parameters?22Record Your Internet Connection Information23Connecting the ProSafe Dual Band Wireless VPN Firewall FWAG114 to Your LAN24PPPoE Wizard-Detected Option28Dynamic IP Wizard-Detected Option30Fixed IP Account Wizard-Detected Option31Manually Configuring Your Internet Connection32Chapter 4 Wireless Configuration35Observe Performance, Placement, and Range Guidelines35Implement Appropriate Wireless Security36Understanding Wireless Settings38Common Wireless Settings39Understanding WEP Authentication and Encryption40Authentication Type40WEP41Default Factory Settings41Before You Change the SSID and WEP Settings42How to Set Up and Test Basic Wireless Connectivity43How to Restrict Wireless Access by MAC Address44How to Configure WEP46Chapter 5 Firewall Protection and Content Filtering47Firewall Protection and Content Filtering Overview47Block Sites48Using Rules to Block or Allow Specific Kinds of Traffic49Inbound Rules (Port Forwarding)51Inbound Rule Example: A Local Public Web Server51Inbound Rule Example: Allowing Videoconference from Restricted Addresses52Considerations for Inbound Rules52Outbound Rules (Service Blocking)53Following is an application example of outbound rules:53Outbound Rule Example: Blocking Instant Messenger53Order of Precedence for Rules54Default DMZ Server54Respond to Ping on Internet WAN Port55Services56Using a Schedule to Block or Allow Specific Traffic58Time Zone59Getting E-Mail Notifications of Event Logs and Alerts60Viewing Logs of Web Access or Attempted Web Access62Syslog63Chapter 6 Maintenance65Viewing VPN Firewall Status Information65Viewing a List of Attached Devices69Upgrading the Router Software69Configuration File Management70Restoring and Backing Up the Configuration71Erasing the Configuration72Changing the Administrator Password72Chapter 7 Virtual Private Networking73Overview of FWAG114 Policy-Based VPN Configuration73Using Policies to Manage VPN Traffic74Using Automatic Key Management74IKE Policies’ Automatic Key and Authentication Management75VPN Policy Configuration for Auto Key Negotiation78VPN Policy Configuration for Manual Key Exchange81Using Digital Certificates for IKE Auto-Policy Authentication86Certificate Revocation List (CRL)86Walk-Through of Configuration Scenarios on the FWAG11487VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets88FWAG114 Scenario 1: FWAG114 to Gateway B IKE and VPN Policies89How to Check VPN Connections92FWAG114 Scenario 2: FWAG114 to FWAG114 with RSA Certificates94Chapter 8 Advanced Configuration101How to Configure Dynamic DNS101Using the LAN IP Setup Options103Configuring LAN TCP/IP Setup Parameters103Using the Router as a DHCP server104Using Address Reservation105Configuring Static Routes106Enabling Remote Management Access108Chapter 9 Troubleshooting111Basic Functioning111Power LED Not On111LEDs Never Turn Off112LAN or Internet Port LEDs Not On112Troubleshooting the Web Configuration Interface113Troubleshooting the ISP Connection114Troubleshooting a TCP/IP Network Using a Ping Utility115Testing the LAN Path to Your Router115Testing the Path from Your PC to a Remote Device116Restoring the Default Configuration and Password117Problems with Date and Time117Appendix A Technical Specifications119Appendix B Network, Routing, Firewall, and Basics121Related Publications121Basic Router Concepts121What is a Router?122Routing Information Protocol122IP Addresses and the Internet122Netmask124Subnet Addressing125Private IP Addresses127Single IP Address Operation Using NAT128MAC Addresses and Address Resolution Protocol129Related Documents129Domain Name Server130IP Configuration by DHCP130Internet Security and Firewalls130What is a Firewall?131Stateful Packet Inspection131Denial of Service Attack131Ethernet Cabling132Uplink Switches, Crossover Cables, and MDI/MDIX Switching132Cable Quality133Appendix C Preparing Your Network135Preparing Your Computers for TCP/IP Networking135Configuring Windows 95, 98, and Me for TCP/IP Networking136Install or Verify Windows Networking Components136Enabling DHCP to Automatically Configure TCP/IP Settings138Selecting Windows’ Internet Access Method140Verifying TCP/IP Properties140Configuring Windows NT4, 2000 or XP for IP Networking141Install or Verify Windows Networking Components141Enabling DHCP to Automatically Configure TCP/IP Settings142DHCP Configuration of TCP/IP in Windows XP142DHCP Configuration of TCP/IP in Windows 2000144DHCP Configuration of TCP/IP in Windows NT4147Verifying TCP/IP Properties for Windows XP, 2000, and NT4149Configuring the Macintosh for TCP/IP Networking150MacOS 8.6 or 9.x150MacOS X150Verifying TCP/IP Properties for Macintosh Computers151Verifying the Readiness of Your Internet Account152Are Login Protocols Used?152What Is Your Configuration Information?152Obtaining ISP Configuration Information for Windows Computers153Obtaining ISP Configuration Information for Macintosh Computers154Restarting the Network155Appendix D Wireless Networking Basics157Wireless Networking Overview157Infrastructure Mode158Ad Hoc Mode (Peer-to-Peer Workgroup)158Network Name: Extended Service Set Identification (ESSID)158Authentication and WEP Data Encryption159802.11 Authentication159Open System Authentication160Shared Key Authentication160Overview of WEP Parameters161Key Size162WEP Configuration Options163Wireless Channels163802/11b/g Wireless Channels164802/11a Legal Power Output and Wireless Channels165Appendix E Virtual Private Networking167What is a VPN?167What Is IPSec and How Does It Work?168IPSec Security Features168IPSec Components169Encapsulating Security Payload (ESP)169Authentication Header (AH)170IKE Security Association171Mode171Key Management172Understand the Process Before You Begin173VPN Process Overview173Network Interfaces and Addresses174Interface Addressing174Firewalls175Setting Up a VPN Tunnel Between Gateways175VPNC IKE Security Parameters177VPNC IKE Phase I Parameters177VPNC IKE Phase II Parameters178Testing and Troubleshooting178Additional Reading178Glossary181List of Glossary Terms181Index189크기: 4.39메가바이트페이지: 192Language: English매뉴얼 열기
사용자 설명서차례Reference Manual for the Model FWAG114 Cable/ DSL Wireless ProSafe Firewall1Contents5About This Manual5Chapter 1 Introduction5Chapter 2 Connecting the Firewall to the Internet5Chapter 3 Wireless Configuration6Chapter 4 Firewall Protection and Content Filtering6Chapter 5 Maintenance7Chapter 6 Advanced Configuration7Chapter 7 Troubleshooting8Appendix A Technical Specifications8Appendix B Network, Routing, Firewall, and Basics8Appendix C Preparing Your Network9Appendix D Wireless Networking Basics9Glossary10Index10About This Manual11Audience11Typographical Conventions11Special Message Formats12Chapter 1 Introduction13Key Features of the Firewall13802.11g and 802.11b Wireless Networking14A Powerful, True Firewall with Content Filtering14Security15Autosensing Ethernet Connections with Auto Uplink™15Extensive Protocol Support16Easy Installation and Management16Maintenance and Support17Package Contents17The Firewall’s Front Panel18The Firewall’s Rear Panel18Chapter 2 Connecting the Firewall to the Internet21What You Will Need Before You Begin21Cabling and Computer Hardware Requirements21Computer Network Configuration Requirements21Internet Configuration Requirements22Where Do I Get the Internet Configuration Parameters?22Record Your Internet Connection Information23Connecting the Model FWAG114 Cable/DSL Wireless ProSafe Firewall to Your LAN24PPPoE Wizard-Detected Option28Telstra Bigpond Cable Wizard-Detected Option29Dynamic IP Wizard-Detected Option30Fixed IP Account Wizard-Detected Option31Manually Configuring Your Internet Connection32Chapter 3 Wireless Configuration35Observe Performance, Placement, and Range Guidelines35Implement Appropriate Wireless Security36Understanding Wireless Settings37Common Wireless Settings39Understanding WEP Authentication and Encryption40Authentication Scheme Selection40Encryption Strength Choices40Default Factory Settings41Before You Change the SSID and WEP Settings41How to Set Up and Test Basic Wireless Connectivity43How to Restrict Wireless Access by MAC Address44How to Configure WEP46Chapter 4 Firewall Protection and Content Filtering47Firewall Protection and Content Filtering Overview47Block Sites48Using Rules to Block or Allow Specific Kinds of Traffic49Inbound Rules (Port Forwarding)51Inbound Rule Example: A Local Public Web Server52Inbound Rule Example: Allowing Videoconference from Restricted Addresses53Considerations for Inbound Rules53Outbound Rules (Service Blocking)54Following is an application example of outbound rules:54Outbound Rule Example: Blocking Instant Messenger54Order of Precedence for Rules55Default DMZ Server55Respond to Ping on Internet WAN Port56Services57Using a Schedule to Block or Allow Specific Traffic59Time Zone60Getting E-Mail Notifications of Event Logs and Alerts61Viewing Logs of Web Access or Attempted Web Access63Examples of log messages65Activation and Administration65Dropped Packets65Syslog66Configuring E-Mail Alert and Web Access Log Notifications66Chapter 5 Maintenance69Viewing Firewall Status Information69Viewing a List of Attached Devices73Upgrading the Router Software73Configuration File Management74Restoring and Backing Up the Configuration75Erasing the Configuration76Changing the Administrator Password76Chapter 6 Advanced Configuration77Configuring for Port Forwarding to Local Servers77Adding a Custom Service78Editing or Deleting a Port Forwarding Entry79Local Web and FTP Server Example79Multiple Computers for Half Life, KALI or Quake III Example79Configuring the WAN Setup Options80Setting Up a Default DMZ Server80Respond to Ping on Internet WAN Port81Setting the MTU Size81Using the LAN IP Setup Options82Configuring LAN TCP/IP Setup Parameters82Using the Router as a DHCP server83Using Address Reservation84Using a Dynamic DNS Service85Configuring Static Routes86Enabling Remote Management Access88Using Universal Plug and Play (UPnP)90Chapter 7 Troubleshooting93Basic Functioning93Power LED Not On93LEDs Never Turn Off94LAN or WAN Port LEDs Not On94Troubleshooting the Web Configuration Interface95Troubleshooting the ISP Connection96Troubleshooting a TCP/IP Network Using a Ping Utility97Testing the LAN Path to Your Router97Testing the Path from Your PC to a Remote Device98Restoring the Default Configuration and Password99Problems with Date and Time99Appendix A Technical Specifications101Appendix B Network, Routing, Firewall, and Basics103Related Publications103Basic Router Concepts103What is a Router?104Routing Information Protocol104IP Addresses and the Internet104Netmask106Subnet Addressing107Private IP Addresses109Single IP Address Operation Using NAT110MAC Addresses and Address Resolution Protocol111Related Documents111Domain Name Server112IP Configuration by DHCP112Internet Security and Firewalls112What is a Firewall?113Stateful Packet Inspection113Denial of Service Attack113Ethernet Cabling114Uplink Switches, Crossover Cables, and MDI/MDIX Switching114Cable Quality115Appendix C Preparing Your Network117Preparing Your Computers for TCP/IP Networking117Configuring Windows 95, 98, and Me for TCP/IP Networking118Install or Verify Windows Networking Components118Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me120Selecting Windows’ Internet Access Method122Verifying TCP/IP Properties122Configuring Windows NT4, 2000 or XP for IP Networking123Install or Verify Windows Networking Components123DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4124DHCP Configuration of TCP/IP in Windows XP124DHCP Configuration of TCP/IP in Windows 2000126DHCP Configuration of TCP/IP in Windows NT4129Verifying TCP/IP Properties for Windows XP, 2000, and NT4131Configuring the Macintosh for TCP/IP Networking132MacOS 8.6 or 9.x132MacOS X132Verifying TCP/IP Properties for Macintosh Computers133Verifying the Readiness of Your Internet Account134Are Login Protocols Used?134What Is Your Configuration Information?134Obtaining ISP Configuration Information for Windows Computers135Obtaining ISP Configuration Information for Macintosh Computers136Restarting the Network137Appendix D Wireless Networking Basics139Wireless Networking Overview139Infrastructure Mode140Ad Hoc Mode (Peer-to-Peer Workgroup)140Network Name: Extended Service Set Identification (ESSID)140Authentication and WEP Data Encryption141802.11 Authentication141Open System Authentication142Shared Key Authentication142Overview of WEP Parameters143Key Size144WEP Configuration Options145Wireless Channels145802/11b/g Wireless Channels146802/11a Legal Power Output and Wireless Channels147Glossary151Index155크기: 2.59메가바이트페이지: 158Language: English매뉴얼 열기