Netgear orporated FVM318 Users Manual

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall Reference Manual
NETGEAR, Inc.
4500 Great America Parkway Santa Clara, CA 95054 USA Phone 1-888-NETGEAR
SM-FVM318NA-0 October 2002
FEDERAL COMMUNICATIONS COMMISSION INTERFERENCE STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
-- Reorient or relocate the receiving antenna.
-- Increase the separation between the equipment and receiver.
-- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
-- Consult the dealer or an experienced radio/TV technician for help.
CAUTION:
Any changes or modifications not expressly approved by the grantee of this device could void the user's authority to operate the equipment.
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20cm between the radiator and your body.
© 2002 by NETGEAR, Inc. All rights reserved.
Trademarks
NETGEAR and Auto Uplink are trademar ks or registered trademarks of Netgear, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corpor at io n. Other brand and product names are registered trademarks or trademarks of their respective holders.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice.
NETGEAR does not assume any liabi l ity that may occur due to the use or applicat ion of the product(s) or circuit layout(s) described herein.
Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice
This equipment has b een tested and found to comply with the limit s for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protecti on against harmful interference in a residential inst allation. This equipment generates, uses, a nd can radiate radio frequency energy and, if not installed and used in accordance with the inst ructions, m ay caus e harmful inte rference to radio c ommunic ations. Ho wever, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving an t enna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help .
EN 55 022 Declaration of Conformance
This is to certify that the FVM318 Cable/ DSL ProSafe Wireless VPN Security Firewall is shielded against the generation of radio interference in accordance with the application of Council Directive 89/336/EEC, Article 4a. Conformity is declared by the application of EN 55 022 Class B (CISPR 22).
ii
Bestätigung des Herstellers/Importeurs
Es wird hiermit bestätigt, daß dasFVM318 Cab le/DSL ProSafe Wireless VPN Securit y Firewall gemäß der im BMPT-AmtsblVfg 243/1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben einiger Geräte (z.B . Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung.
Das Bundesamt für Zulassungen in der Telekommunikation wur de davon unterrich tet, daß dieses Gerät auf den Markt gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.
Certificate of the Manufacturer/Importer
It is hereby certified that the FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall has been suppressed
accordance with the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some
in equipment (for example, test transm itt ers) i n accordance with the regulations may, however, be subject to certain restrictions. Please refer to the notes in the operating instructions.
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations.
Voluntary Control Council for Interference (VCCI) Statement
This equipment is in the second category (information eq uipment to be used in a residen tial area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipment and Electronic Office Machines aimed at preventing radio interference i n such residential areas.
When used near a radio or TV receiver, it may become the cause of radi o i nt erference. Read instructions for correct handling.
Technical Support
Refer to the Support Information Card that shipped with your FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall.
World Wide Web
NETGEAR maintains a World Wide Web home page that you can access at the universal resource locat or (URL) http://www.netgear.com. A direct connection to the Internet and a Web browser such as Internet Explorer or Netscape are required.
iii
iv
Contents
Preface About This Manual
Audience ..................... ............. ....... ............. ............. ............. ............ ............. ............. .1-xiii
Typographical Conventions ..........................................................................................1-xiii
Special Message Formats ........................................................................................... 1-xiv
Technical Support ........................................................................................................ 1-xiv
Chapter 1 Introduction
About the FVM318 ............. ...... ....... ...... ....... ...... ....... ...... ....... ...... ...... .............................1-1
Key Features ..................................................................................................................1-1
A Powerful, True Firewall .........................................................................................1-1
Content Filtering ............................. ....... ...................................................................1-2
Configurable Auto Uplink™ Ethernet Connection ....................................................1-2
Protocol Support ......................................................................................................1-2
Easy Installation and Management ..........................................................................1-3
What’s in the Box? ..........................................................................................................1-5
The Firewall’s Front Panel .................................................................................1-5
The Firewall’s Rear Panel ..................................................................................1-6
Chapter 2 Connecting the Firewall to the Internet
What You Will Need Before You Begin ...........................................................................2-1
LAN Hardware Requirements ..................................................................................2-1
Computer Requirements ....................... .............................................................2-1
Cable or DSL Modem Requirement ..................................................................2-1
LAN Configuration Requirements ............................................................................2-2
Internet Configuration Requirements .......................................................................2-2
Where Do I Get the Internet Configuration Parameters? ..................................2-2
Connecting the FVM318 firewall to Your LAN ................................................................2-4
Connecting the FVM318 firewall to the Internet .............................................................2-8
Contents v
Using the Smart Wizard to Auto-Detect Your Internet Connection Type ..................2-8
Manually Configuring Your Internet Connection .....................................................2-14
Configuring Wireless Connectivity ................................................................................2-17
Testing Your Internet Connection ..................................................................................2-21
Chapter 3 Protecting Your Network
Protecting Access to Your FVM318 firewall ....................................................................3-1
Configuring Basic Firewall Servic es .................. ....... ...... ....... ...... ...... ....... ...... ....... ...... ...3- 3
Blocking Functions, Keywords, Sites, and Services ................................................3-3
Block Services ......................... ....... ...... ....... ......................................................3-5
Setting Times and Scheduling Firewall Services ............................................................3-7
Chapter 4 Virtual Private Networking
Network to Network and Remote Computer to Network VPNs ......................................4-1
Planning a VPN ..............................................................................................................4-2
VPN Configuration Choices ...............................................................................4-2
Sample Network to Network VPN Tunnel Configuration Worksheet .................4-3
Using the VPN Connection ..............................................................................4-11
Configuring a Remote PC to Network VPN ..................................................................4-12
Sample PC to Network VPN Tunnel Configuration Worksheet .......................4-12
Check the VPN Connection .............................................................................4-21
Monitoring the PC to Network VPN Connection Using SafeNet Tools ............4-22
Deleting a Security Association ..............................................................................4-23
Manual Keying ..............................................................................................................4-24
Blank VPN Tunnel Configuration Worksheets ..............................................................4-26
Chapter 5 Managing Your Network
Network Management Information .................................................................................5-1
Viewing Router Status and Usage Statistics ............................................................5-1
Viewing Attached Devices ........................................................................................5-4
Viewing, Selecting, and Saving Logged Information ................................................5-5
Selecting What Information to Log ....................................................................5-6
Saving Log Files on a Server .. ....... ...... ....... ...... ....................................... ...... ...5-7
Examples of log messages ......................................................................................5-7
Activation and Administration ............................................................................5-7
vi Contents
Dropped Packets ...............................................................................................5-7
Enabling Security Event E-mail Notification ...................................................................5-8
Backing Up, Restoring, or Erasing Your Settings ...........................................................5-9
Running Diagnostic Utilities and Rebooting the Router ................................................5-12
Enabling Remote Management ....................................................................................5-13
Upgrading the Router’s Firmware .................................................................................5-14
Chapter 6 Wireless Configuration
Considerations For A Wireless Network .........................................................................6-1
Security ....................................................................................................................6-1
Placement and Range ..............................................................................................6-1
Wireless Settings ............................................................................................................6-2
Wireless Network Settings .......................................................................................6-3
Using the Wireless Card Access List to Restrict Wireless Access by MAC Address 6-4
Configuring Wired Equivalent Privacy (WEP) ..........................................................6-5
Chapter 7 Advanced Configuration
Configuring Advanced Security ......................................................................................7-1
Setting Up A Default DMZ Server ............................................................................7-1
Respond to Ping on Internet WAN Port ...................................................................7-2
Configuring LAN IP Settings ...........................................................................................7-2
LAN TCP/IP Setup ...................................................................................................7-2
MTU Size .................................................................................................................7-3
DHCP ................................ ................................................................. ......................7-4
Use router as DHCP server ...............................................................................7-4
Reserved IP addresses .....................................................................................7-5
Configuring Dynamic DNS .......................................................................................7-6
Using Static Routes ........................................................................................................7-8
Static Route Example ...............................................................................................7-8
Chapter 8 Troubleshooting
Basic Functions .... ...... ....... ...... ....... ................................................................................8-1
Power LED Not On ...................................................................................................8-2
Test LED Never Turns On or Test LED Stays On .....................................................8-2
Local or Internet Port Link LEDs Not On ..................................................................8-2
Contents vii
Troubleshooting the Web Configuration Interface ..........................................................8-4
Troubleshooting the ISP Connection ..............................................................................8-5
Troubleshooting a TCP/IP Network Using a Ping Utility .................................................8-6
Testing the LAN Path to Your Firewall ......................................................................8-6
Testing the Path from Your PC to a Remote Device ................................................8-7
Restoring the Default Configuration and Password ........................................................8-8
Using the Default Reset button ................................................................................8-8
Problems with Date and Time .........................................................................................8-9
Appendix A Technical Specifications
Appendix B Network, Routing, Firewall, and Wireless Basics
Related Publications ...................................................................................................... B-1
Basic Router Concepts ................... ...... ....... ...... ............................................. ............... B-1
What is a Router? ................................................................................................... B-2
Routing Information Protocol ................................................................................... B-2
IP Addresses and the Internet ................................................................................. B-2
Netmask ............................ ................................................................. ..................... B -4
Subnet Addressing .................................................................................................. B-5
Private IP Addresses ............................................................................................... B-7
Single IP Address Operation Using NAT ................................................................. B-8
MAC Addresses and Address Resolution Protocol ................................................. B-9
Related Documents ................................................................................................. B-9
Domain Name Server ............................................................................................ B-10
IP Configuration by DHCP .................................................................................... B-10
Ethernet Cabling ...........................................................................................................B-11
Uplink Switches and Crossover Cables .................................................................B-11
Cable Quality ......................................................................................................... B-12
Internet Security and Firewalls .................................................................................... B-12
What is a Firewall? ................................................................................................ B-12
Stateful Packet Inspection ..................................................................................... B-13
Denial of Service Attack ........................................................................................ B-13
Wireless Networking .................................................................................................... B-13
Wireless Network Configuration ............................................................................ B-13
Ad-hoc Mode (Peer-to-Peer Workgroup) ........................................................ B-14
viii Contents
Infrastructure Mode .... .................................................................................... B-14
Extended Service Set Identification (ESSID) ........................................................ B-14
Authentication and WEP Encryption ..................................................................... B-15
Wireless Channel Selection .................................................................................. B-15
Ethernet Cabling .......................................................................................................... B-17
Uplink Switches, Crossover Cables, and MDI/MDIX Switching ............................ B-17
Cable Quality ......................................................................................................... B-18
Appendix C Preparing Your Network
Preparing Your Computers for TCP/IP Networking .......................................................C-1
Configuring Windows 95, 98, and ME for TCP/IP Networking ................................ C-2
Install or Verify Windows Networking Components ..........................................C-2
Enabling DHCP to Automatically Configure TCP/IP Settings ........................... C-4
Selecting Windows’ Internet Acce ss Metho d ........................ ....... ...... ....... ........C-4
Verifying TCP/IP Properties .............................................................................. C-5
Configuring Windows NT, 2000 or XP for IP Networking ........................................C-5
Install or Verify Windows Networking Components ..........................................C-5
Verifying TCP/IP Properties .............................................................................. C-6
Configuring the Macintosh for TCP/IP Networking ..................................................C-6
MacOS 8.6 or 9.x ............... ...... ....... ...... ............................................................C-6
MacOS X . ...... ....... ...... ....... ............................................................................... C-7
Verifying TCP/IP Properties for Macintosh Computers ..................................... C-8
Verifying the Readiness of Your Internet Account ......................................................... C-9
Are Login Protocols Used? .....................................................................................C-9
What Is Your Configuration Information? ................................................................C-9
Obtaining ISP Configuration Information for Windows Computers ................. C-10
Obtaining ISP Configuration Information for Macintosh Computers ............... C-11
Restarting the Network ................................................................................................ C-12
Glossary Index
Contents ix
x Contents
List of Procedures
Procedure 2-1: Record Your Internet Connection Information ......................................2-3
Procedure 2-2: Connecting the Firewall to Your LAN ....................................................2-4
Procedure 2-3: Auto-Detecting Your Internet Connection Type ....................................2-9
Procedure 2-4: Wizard-Detected Login Account Setup ...............................................2-10
Procedure 2-5: Wizard-Detected Dynamic IP Account Setup .....................................2-11
Procedure 2-6: Wizard-Detected Fixed IP (Static) Account Setup ..............................2-13
Procedure 2-7: Manual Configuration .........................................................................2-14
Procedure 2-8: Serial Port Internet Connection Configuration ....................................2-17
Procedure 3-1: Changing the Built-In Password ...........................................................3-2
Procedure 3-1: Changing the Administrator Login Timeout ..........................................3-3
Procedure 3-2: Block Functions, Keywords, and Sites .................................................3-4
Procedure 3-3: Block Services ......................................................................................3-6
Procedure 3-4: Setting Yo ur Time Zone ........................................................................3-7
Procedure 3-5: Scheduling Firewall Services ................................................................3-9
Procedure 4-1: Configuring a Network to Network VPN Tunnel ....................................4-4
Procedure 4-2: Check the VPN Connection ................................................................4-11
Procedure 4-3: Configuring a Remote PC to Network VPN ........................................4-13
Procedure 4-4: Using Manual Keying as an Alternative to IKE ...................................4-24
Procedure 5-5: Backup the Configuration to a File .......................................................5-9
Procedure 5-6: Restore a Configuration from a File ....................................................5-11
Procedure 5-7: Erase the Configuration ......................................................................5-11
Procedure 5-8: Configure Remote Management ........................................................5-13
Procedure 5-1: Router Upgrade ..................................................................................5-14
Procedure 7-1: Configure LAN TCP/IP Setup ...............................................................7-6
Procedure 7-2: Configure Dynamic DNS ......................................................................7-7
Procedure 7-3: Configuring Static Routes .....................................................................7-9
xi
xii
Preface
About This Manual
Thank your for purchasi ng the NETGEAR™ FVM318 Cable/DSL ProSafe W ir eless VPN Secur ity Firewall.
This manual describes the features of the firewall and provides installation and configuration instructions.
Audience
This reference manu al assumes th at the reade r has int ermediate to advanced com puter and Intern et skills. However, basic computer network, Internet, firewall, and VPN technologies tutorial information is provided in the Appendices.
Typographical Conventions
This guide uses the following typographical conventions: italics Book titles and UNIX file, command, and directory names.
courier font Screen text, user-typed command-line entries.
Initial Caps Menu titles and window and button names. [Enter] Named keys in text are shown enclosed in square brackets. The notation
[Enter] is used for the Enter key and the Return key.
[Ctrl]+C Two or more keys that must be pressed simultaneously are shown in text
linked with a plus (+) sign.
ALL CAPS DOS file and directory names.
About This Manual xiii
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Special Message Forma ts
This guide uses the following formats to highlight special messages:
Note: This format is used to highlight information of importance or special interest.
Procedure: This format is used to let you know that you are following a sequence of
steps required to complete a task.
Warning: This format is used to highligh t in for mat ion about the possibility of inj ur y or
equipment damage.
Danger: This format is used to alert you that there is the potential for incurring an
electrical shock if you mishandle the equipment.
Technical Support
For help with any technical issues, contact Customer Support at 1-888-NETGEAR, or visit us on the Web at www.NETGEAR.com. The NETGEAR Web site includes an extensive knowledge base, answers to frequently asked questions, and a means for submitting technical questions online.
xiv About This Manual
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
About This Manual xv
Chapter 1
Introduction
This chapter describ es the f eatur es of t he NETGEAR FVM318 Cabl e/DSL Pro Safe Wireless VPN Security Fir ewall.
About the FVM318
The FVM318 is a complete security solution that protects your network from attacks and intrusions. Unlike s impl e Int ernet shar ing rou ters th at re ly on Net work Addr ess Translation (NAT) for security, the FVM318 uses Stateful Packet Inspection for Denial of Service (DoS) attack protection and intrusion detection. The 8-port FVM318 with auto fail-over connectivity through the serial port provides highly reliable Internet access for up to 253 users.
Key Features
The FVM318 offers the following features.
A Powerful, True Firewall
Unlike simple Internet sharing NAT routers, the FVM318 is a true firewall, using stateful packet inspection to defend against hacker attacks. Its firewall features include:
Denial of Service (DoS) protection
Automatically detects and thwarts Denial of Service (DoS) attacks such a s Ping of Death, SYN Flood, LAND Attack and IP Spoofing.
Blocks unwanted traffic from the Internet to your LAN.
Blocks access from your LAN to Internet locations or services that you specify as off-limits.
Introduction 1-1
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Logs security incidents
The FVM318 will log security events such as blocked incoming traffic, port scans, attacks, and administrator logins. You can configure the firewall to email the log to you at specified intervals. You can also configure the firewall to send immediate alert messages to your email address or email pager whenever a significant event occurs.
Content Filtering
With its content filtering feature, the FVM318 prevents objectionable content from reaching your PCs. The firewall allows you to control access to Internet content by screening for keywords within Web addresses. You can configure the firewall to log and report attempts to access objectionable Internet sites.
Configurable Auto Uplink™ Ethernet Connection
With its internal 8-port 10/100 switch, the FVM318 can connect to either a 10 Mbps standard Ethernet network or a 10 0 Mbps Fast Etherne t net work . Both the l ocal LAN and the I ntern et WAN interfaces are autosensing and capable of full-duplex or half-duplex operation.
The firewall incorporates Auto Uplin kTM technology. Each LOCAL Ethernet port will automatically sense whether the Ethernet cable plugged into the port should have a ‘normal’ connection such as to a PC or an ‘uplin k’ connecti on such as to a switch or hub. Th at port wil l then configure itself to the correct configuration. This feature also eliminates the need to worry about crossover cables, as Auto Uplink will accommodate either type of cable to make the right connection.
Protocol Support
The FVM318 supports the Transmissio n Co ntr ol Pr ot ocol /Internet Protocol (TCP/IP) and Routing Information Protocol (RIP). provides further information on TCP/IP.
IP Address Sharing by NAT
The FVM318 allows severa l networke d PCs to sha re an Int ernet accoun t usin g only a si ngle IP address, which may be statically or dynamically assigned by your Internet service provider (ISP). This technique, known as Network Address Translation (NAT), allows the use of an inexpensive single-user ISP account.
1-2 Introduction
Appendix B, “Network, Routing, Firewall, and Wireless Basics”
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Automatic Configuration of Attached PCs by DHCP
The FVM318 dynamically assigns network configuration information, including IP, gateway, and domain name server (DNS) addresses, to atta ched PCs on the LAN using the Dynamic Host Configuration Protocol (DHCP). This feature greatly simplifies configuration of PCs on your local network.
DNS Proxy
When DHCP is enabled and no DNS addresses are specified, the firewall provides its own address as a DNS server to the attached PCs. The firewall obtains actual DNS addresses from the ISP during connection setup and forwards DNS requests from the LAN.
PPP over Ethernet (PPPoE)
PPP over Ethernet is a protocol for connecting remote hosts to the Internet over a DSL connection by simulating a dial-up connection. This feature eliminates the need to run a login program such as EnterNet or WinPOET on your PC.
PPTP login support for European ISPs, BigPond login for Telstra cable in Australia.
•Dynamic DNS
Dynamic DNS services allow remote users to find your network using a domain name when your IP address is not pe rman ent ly assigned. The firewall contai ns a client that can connect to many popular Dynamic DNS services to register your dynamic IP address.
Easy Installation and Management
You can install, configure, and operate the FVM318 within minutes after connecting it to the network. The following features simplify installation and management tasks:
Browser-based management
Browser-based configuration allows you to easily configure your firewall from almost any type of personal computer, such as Windows, Macintosh, or Linux. A user-friendly Setup Wizard is provided and online help documentation is built into the browser-based Web Management Interface.
Smart Wizard
The firewall automatically senses the type of Internet connection, asking you only for the information required for your type of ISP account.
Auto fail-over connectivity through an analog or ISDN modem connected to the serial port
If the cable or DSL modem I ntern et c onnect ion f ails , aft er a wait ing f or a n amount o f time you specify, the FVM318 can automatically establish a backup ISDN or dial-up Internet connection via the serial port on the firewall.
Introduction 1-3
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Remote management
The firewall allows you to logi n t o the W eb Management Interface from a re mo te loc ati on vi a the Internet. For security, you can limit remote management access to a specif ied remote IP address or range of addresses, and you can choose a nonstandard port number.
Remote Access Server connectivity vial the serial port
Diagnostic functions
The firewall incorporates built-in diagnostic functions such as Ping, DNS lookup, and remote reboot. These functi ons allow you to test Inter net conne ctivity and reboot the fi rewall. You can use these diagnostic functions directly from the FVM318 when your are connect on the LAN or when you are connected over the Internet via the remote management function.
Visual monitoring
The firewall’s front panel LEDs provide an easy way to monitor its status and activity.
Flash EPROM for firmware upgrade
Regional support, including ISPs like Telstra DSL and BigPond or Deutsche Telekom.
1-4 Introduction
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
What’s in the Box?
The product package should contain the following items:
FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
AC power adapter
Category 5 (CAT5) Ethernet cable
FVM318 Resource CD, including: — This manual — Application Notes, Tools, and other helpful information
Warranty and registration card
Support information card
If any of the parts are incorrect, missing, or damaged, contact your NETGEAR dealer. Keep the carton, including the original packing materials, in case you need to return the product for repair.
The Firewall’s Front Panel
The front panel of the FVM318 (Figure 1-1) contains status LEDs.
Figure 1-1: FVM318 Front Panel
You can use some of the LEDs to verify connections. Table 1-1 lists and describes each LED on the front pa nel of the firewall.
Introduction 1-5
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
These LEDs are green when lit, except for the TEST LED, which is amber.
Table 1-1: LED Descriptions
Label Activity Description
POWER On Power is supplied to the firewall. TEST On
Off
MODEM On/Blinking The port detected a link with the Internet WAN connection or
INTERNET
100 On/Blinking The Internet port is operating at 100 Mbps. LINK/ACT (Activity) On/Blinking The port detected a link with the Internet WAN connection and is
LOCAL
100 On/Blinking The Local port is operating at 100 Mbps. LINK/ACT
On/Blinking The Local port has detected a link with a LAN connection and is
(Link/Activity)
The system is initializing. The system is ready and running.
Remote Access Server. Blinking indicates data transmission.
operating at 10 Mbps. Blinking indicates data transmission.
operating at 10 Mbps. Blinking indicates data transmission.
The Firewall’s Rear Panel
The rear panel of the FVM318 (Figure 1-2) contains the connections identified below.
MODEM
87654321
10/100M
INTERN ET
12VDCO.5A
LOCA L
Figure 1-2: FVM318 Rear Panel
Viewed from left to right, the rear pa nel contains the followin g elements:
DB-9 serial port for modem connection
Factory Default Reset push button
Eight Local Ethernet RJ-45 ports for connecting the firewall to the local computers
Internet WAN Ethernet RJ-45 port for connecting the firewall to a cable or DSL modem
AC power adapter input
1-6 Introduction
Chapter 2
Connecting the Firewall to the Internet
This chapter describes how to set up the firewall on your Local Area Network (LAN), connect to the Internet, perform basic configuration of your FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall using the Setup Wizard, or how to manually configure your Internet connection.
What You Will Need Before You Begin
You need to prepare these three things before you can connect your firewall to the Internet:
1. A computer properly connected to the firewall as explained below.
2. Active Internet service such as that provided by a DSL or Cable modem account.
3. The Internet Service Provider (ISP) configuration information for your DSL or Cable modem
account.
LAN Hardware Requirements
The FVM318 firewall connects to your LAN via twisted-pair Ethernet cables.
Computer Requirements
To use the FVM318 firewall on your network, each computer must have an installed Ethernet Network Interface Card (NIC) and an Ethernet cable. If the computer will connect to your network at 100 Mbps, you must use a Category 5 (CAT5) cable such as the one provide d with your fire wall.
Cable or DSL Modem Requirement
The cable modem or DSL modem must provide a standard 10 Mbps 10BASE-T or 100 Mbps 100BASE-T Ethernet interface.
Connecting the Firewall to the Internet 2-1
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
LAN Configuration Requirements
For the initial connection to the Inter net and configuration of your firewall, you will need to connect a computer to the firewal l which is set to automa ti cally get its TCP/IP configurati on fr om the firewall via DHCP.
Note: Please refer to Appendix C, "Preparing Your Network" for assistance with DHCP
configuration.
Internet Configuration Requirements
Depending on how your ISP set up your Internet account, you will need one or more of these configuration parameters to connect your firewall to the Internet:
Host and Domain Names
ISP Login Name and Password
ISP Domain Name Server (DNS) Addresses
Fixed or Static IP Address
Where Do I Get the Internet Configuration Parameters?
There are several ways you can gather the required Internet connection information.
Your ISP should have provided you with all the inf orma ti on ne eded to connect to the Inte rne t. If you cannot locate this information, you can ask your ISP to provide it or you can try one of the options below.
If you have a computer already connected using the active Internet access account, you can gather the configuration information from that computer.
For Windows 95/98/ME, open the Network control panel, select the TCP/IP entry for the
Ethernet adapter, and click Properties.
For Windows 2000/XP, open the Local Area Network Connecti on, select the TCP/IP entry
for the Ethernet adapter, and click Properties.
For Macintosh computers, open the TCP/IP or Network control panel.
You may also refer to the FR328S Resource CD for the NETGEAR Router ISP Guide which provides Internet connection information for many ISPs.
Once you locate your Internet configu ration par ameters , you may want to rec ord them on the page below according to the instructions in
page 2-3.
2-2 Connecting the Firewall to the Internet
“Record Your Internet Connection Information” on
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 2-1: Record Your Internet Connection Information
1. Print this page. Fill in the configuration parameters from your Internet Service Provider (ISP).
ISP Login Name: The login name an d pas swor d ar e ca se s ens itive and must be entered exact ly as given by your ISP. Some ISPs use your full e -mail addr ess as the l ogin na me. The Ser vice Na me is not required by all ISPs. If you connect using a login name and password, then fill in the following:
Login Name: ______________________________ Password: ____________________________ Service Nam e: _____________________________ Fixed or Static IP Address: If you have a static IP address, record the following information. For
example, 169.254.141.148 could be a valid IP address. Fixed or Static Internet IP Address: ______ . ______ . ______ . ______ Subnet Mask: ______ . ______ . ______ . ______ Gateway IP Address: ______ . ______ . ______ . ______
ISP DNS Se rver Addres ses: If you were given DNS server addresses, fill in the following: Primary DNS Server IP Address: ______ . ______ . ______ . ______ Secondary DNS Server IP Address: ______ . ______ . ______ . ______
Host and Domain Names: Some ISPs use a specific host or domain name like CCA7324-A or
home. If you haven’t been given host or domain names, you can use the following examples as a
guide:
If your main e-mail account with your ISP is aaa@yyy.com, then use aaa as your host name. Your ISP might call this your account, user, host, computer, or system name.
If your ISP’s mail server is mail.xxx.yyy.com, then use xxx.yyy.com as the domain name.
ISP Host Name: _________________________ ISP Domain Name: _______________________ For Serial Port Intern et Access: If you use a dial-up account, record the following:
Account/U ser Name: _________________________ Password: _________________________ Telephone number:
Connecting the Firewall to the Internet 2-3
______________________ Alternative number: ______________________
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Connecting the FVM318 firewall to Your LAN
This section provides instructions for connecting the FVM318 Cable/DSL ProSafe Wireless VPN Security Fir ewall to your
Note: The Resource CD included with your firewall con tains an animat ed Installat ion Assista nt to
help you through this procedure.
Procedure 2-2: Connecting the Firewall to Your LAN
There are three steps to connecting your firewall:
1. Connect the firewall to your network
2. Log in to the firewall
3. Connect to the Internet
Follow the steps below to connect your firewall to your network. You can also refer to the Resource CD included wi th your firewa ll which contains an animat ed Inst allation As sistant to help you through this procedure.
Local Area Network (LAN).
1. Connect the Firewall a. Turn off your computer and Cable or DSL Modem.
2-4 Connecting the Firewall to the Internet
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
b. Disconnect the Ethernet cable (A) from your computer which connects to your Cable or
DSL modem.
A
DSL modem
Figure 2-1: Disconnect the Cable or DSL Modem
c. Connect the Ethernet cable (A) from your Cable or DSL modem to the FR328S’s Internet
port.
Cable or
DSL modem
A
Figure 2-2: Connect the Cable or DSL Modem to the firewall
Connecting the Firewall to the Internet 2-5
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
d. Connect the Ethernet cable (B) which came with the firewa ll from a Local port on the
router to your computer.
Cable or
B
Figure 2-3: Connect the computers on your network to the firewall
Note: The FVM318 firewall incorporates Auto UplinkTM technology. Each LAN Ethernet port will automatically sense whether the cable plugged into the port should have a 'normal' connection (e.g. connecting to a PC) or an 'uplink' connection (e.g. connecting to a switch or hub). That port will then configure itself to the correct configuration. This feature also eliminates the need to worry about crossover cables, as Auto Uplink will accommodate either type of cab le to make the right connection.
DSL modem
A
e. Turn on the Cable or DSL modem and wait about 30 seconds for the lights to stop
blinking.
2. Log in to the Firewall
Note: T o conn ect to the fi rewall, your comput er needs to be conf igured to obt ain an IP addre ss automatically via DHCP. Please refer to instructions on how to do this.
a. Turn on the firewall and wait for the Test light to stop blinking. b. Now, turn on your computer.
Note: If you usually run software to log in to your Internet connection, do not run that software.
2-6 Connecting the Firewall to the Internet
Appendix C, "Preparing Your Network" for
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Now that the Cable or DSL Modem, fire wall, and the computer ar e turned on, verify the following:
When power on the firewall was first turned on, the PWR light went on, the TEST light
turned on within a few seconds, and then went off after approximately 10 seconds.
The firewall’s LOCAL LINK/ACT lights are lit for any compu ters th at are conne cted to it .
The firewall’s INTERNET LINK light is lit, indicating a link has been established to the
cable or DSL modem.
c. Next, use a browser like Internet Explorer or Netscape to log in to the firewall at its default
address of http://192.168.0.1.
Figure 2-4: Log in to the firewall
A login window opens as shown in Figure 2-5 below:
Figure 2-5: Login window
d. For security reasons, the firewall has its own user name and password. When prompted,
admin for the firewall User N ame and password for the firewall Password, both in
enter lower case letters.
Note: The user name and password are not the same as any user name or password you may use to log in to your Internet connection.
Connecting the Firewall to the Internet 2-7
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
3. Connect to the Internet
Figure 2-6: Setup Wizard
a. You are now connected to the firewall. If you do not see the menu above, click the Setup
Wizard link on the upper left of the main menu. Click the Yes button in the Setup Wizard.
b. Please click Next to follow the steps in the Setup Wizard to input the configuration
parameters from your ISP to connect to the Internet.
Note: If you were unable to connect to the firewall, please refe r to “Basic Functions” on page 8-1.
Connecting the FVM318 firewall to the Internet
The firewall is now properly attached to your network. You are now ready to configure your firewall to connect to the Internet. There are two ways you can configure your firewall to connect to the Internet:
Let the FVM318 auto-detect the type of Internet connection you have and configure it.
Manually choose which type of Internet connection you have and configure it.
These options are described below. In either case, unless your ISP automatically assigns your configuration automatically via DHCP, you will need the configuration parameters from your ISP you recorded in “Record Your Internet Connection Information” on page 2-3.
Using the Smart Wizard to Auto-Detect Your Internet Connection Type
Follow the procedures below to let the Smart Wizard help set up your Internet configuration.
2-8 Connecting the Firewall to the Internet
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 2-3: Auto-Detecting Your Internet Connection Type
The Web Configuration Manager built in to the firewall contains a Setup Wizard that can automatically determine your network connection type.
1. If your firewall has not yet been configured, the Setup Wizard shown in Figure 2-7 should
launch automatically. When the Wizard launches, select Yes in the menu below to allow the firewall to automatically
determine your connection.
Figure 2 -7: Built -in Web-based Config ura t ion Mana ge r Setu p Wizard
Note: If, instead of the Setup Wizard menu, the main menu of the firewall’s Configuration Manager as shown in
Figure 2-13 appears, click the Setup Wizard link in the upper left to
bring up this menu.
2. Click Next
The Setup Wizard will now check for the following connection types:
Dynamic IP assignment
A login protocol such as PPPoE
Fixed IP address assignment
Connecting the Firewall to the Internet 2-9
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Next, the Setup Wizard will report which connection type it has discovered, and then display the appropriate configuration menu. If the Setup Wizard finds no connection, you will be prompted to check the physical connection between your firewall and the cable or DSL modem. When the connection is properly made, the firewall’s Internet LED should be on.
The procedures for filling in the configuration menu for each type of connection follow below.
Procedure 2-4: Wizard-Detected Login Account Setup
If the Setup Wizard determines that your Internet service account uses a login protocol such as PPP over Ethernet (PPPoE), you will be directed to a menu like the PPPoE menu in
Figure 2-8:
Figure 2-8: Setup Wizard menu for PPPoE login accounts
1. Enter your Account Name (may also be called Host Name) and Domain Name. These
parameters may be ne cessary to acc ess your ISP’s services such as mai l or news servers . If yo u leave the Domain Name field blank, the firewall will attempt to learn the domain automatically from the ISP. If this is not successful, you may need to enter it manually.
2. Enter the PPPoE login user name and password provided by your ISP. These fields are case
sensitive. If you wish to change the login timeout, enter a new value in minutes.
2-10 Connecting the Firewall to the Internet
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Note: You will no longer need to launch the ISP’s login prog ram on yo ur PC in ord er to acc ess
the Internet. When you start an Internet application, your firewall wi ll automatically log you in.
3. Domain Name Server (DNS) Address: If you know that your ISP does not automatically
transmit DNS addresses to the firewall during login, select “Use these DNS servers” and enter the IP address of your ISP’s Primary DNS Server. If a Secondary DNS Server address is available, enter it also.
If you enter an address here, after you finish configuring the firewall, reboot your PCs so that the settings take e ffe ct.
4. Click on Apply to save your settings.
5. Click on the Test button to test your Internet connection. If the NETGEAR website does not
appear within one minute, refer to
Chapter 8, Troubleshooting”.
Procedure 2-5: Wizard-Detected Dynamic IP Account Setup
If the Setup Wizard determines that your Internet service account uses Dynamic IP assignment, you will be directed to the menu shown in
Figure 2-9 below:
Figure 2-9: Setup Wizard menu for Dynamic IP address
Connecting the Firewall to the Internet 2-11
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
1. Enter your Account Name (may also be called Host Name) and Domain Name. These
parameters may be ne cessary to acc ess your ISP’s services such as mai l or news servers . If yo u leave the Domain Name field blank, the firewall will attempt to learn the domain automatically from the ISP. If this is not successful, you may need to enter it manually.
2. If you know that your ISP does not automatically transmit DNS addresses to the firewall
during login, select “Use these DNS servers” and enter the IP address of your ISP’s Primary DNS Server. If a Secondary DNS Server addres s is available, enter it also.
A DNS server is a host on the Internet that translates Internet names (such as www .netge ar.com) to numeric IP addresses. Ty pic ally your ISP tr ansfe rs the IP add ress of one or two DNS servers to your firewall during login. If the ISP does not transfer an address, you must ob tain it fr om the ISP a nd enter it manuall y here. I f you ent er an addr ess here, you should reboot your PCs after configuring the firewall.
3. The Router’s MAC Address is the Ethernet MAC address that will be used by the firewall on
the Internet port. If your ISP allows access from only one specific computer’s Ethernet MAC address, select
“Use this MA C address.” The firewall will then cap ture and use the MAC address of the computer that you are now using. You must be using the one computer that is allowed by the ISP. Otherwise, you can type in a MAC address.
Note: Some ISPs will register the Ethernet MAC address of the network interface card in your PC when your account is first opened. They will then only accept traffic from the MAC address of that PC. This feature allows your firewall to masquerade as that PC by using its MAC address.
4. Click on Apply to save your settings.
5. Click on the Test button to test your Internet connection. If the NETGEAR website does not
appear within one minute, refer to
2-12 Connecting the Firewall to the Internet
Chapter 8, Troubleshooting”.
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 2-6: Wizard-Detected Fixed IP (Static) Account Setup
If the Setup Wizard determines that your Internet service account uses Fixed IP assignment, you will be directed to the menu shown in
Figure 2-10: Setup Wizard menu for Fixed IP address
Figure 2-10 below:
1. Enter your assigned IP Address, Subnet Mask, and the IP Address of your ISP’s gateway
router. This information should have been provided to you by your ISP. You will need the configuration parameters from your ISP you recorded in “Record Your Internet Connection
Information” on page 2-3.
2. Enter the IP address of your ISP’s Primary DNS Server. If a Secondary DNS Server address is
available, enter it also.
A DNS servers are requi red to p erform th e functi on of tra nslatin g an Inte rnet name such as www .netgear.com to a numeric IP addres s. For a fixed IP address c onfi gur ation, you must obtain DNS server addresses from your ISP and enter them manually here. You should reboot your PCs after configuring the firewall for these settings to take effect.
3. Click on Apply to save the settings.
4. Click on the Test button to test your Internet connection. If the NETGEAR website does not
appear within one minute, refer to
Connecting the Firewall to the Internet 2-13
Chapter 8, Troubleshooting.
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Manually Configuring Your Internet Connection
You can manually configure your firewall using the menu below, or you can allow the Setup Wizard to determine your configuration as described in the previous section.
Figure 2-11: Browser-based configuration Basic Settings menu
Procedure 2-7: Manual Configuration
You can manually configure the firewall in the Basic Settings menu shown in Figure 2-13 using these steps:
2-14 Connecting the Firewall to the Internet
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
1. Select whether your Internet connection requires a login.
Select Broadband with Login if you normally must lau nch a login program such as Enterne t or WinPOET in order to access the Internet.
Note: If you are a Telstra BigPond cable modem customer, or if you are in an area such as Austria that uses PPTP, login is required. If so, select BigPond or PPTP from the Internet Service Type drop down box.
2. Enter your Account Name (may also be called Host Name) and Domain Name.
These parameters may be nec essar y to access your IS P’s services such as mail or news s erver s.
3. (If displayed) Enter the PPPoE login user name and password provided by your ISP.
These fields are case sensitive. If you wish to change the login timeout, enter a new value in minutes.
Note: You will no longer need to launch the ISP’s login prog ram on yo ur PC in ord er to acc ess
the Internet. When you start an Internet application, your firewall wi ll automatically log you in.
4. Internet IP Address:
If your ISP has assigned you a permanent, fixed (static) IP address for your PC, select “Use static IP address”. Ente r t h e IP addr ess tha t your ISP assigned. Also enter the ne tmas k and t he Gateway IP address. The Gateway is the ISP’s router to which your firewall will connect.
5. Domain Name Server (DNS) Address:
If you know that your ISP does not automatically transmit DNS addresses to the firewall during login, select “Use these DNS servers” and enter the IP address of your ISP’s Primary DNS Server. If a Secondary DNS Server addres s is available, enter it also.
A DNS server is a host on the Internet that translates Internet names (such as www .netge ar.com) to numeric IP addresses. Ty pic ally your ISP tr ansfe rs the IP add ress of one or two DNS servers to your firewall during login. If the ISP does not transfer an address, you must ob tain it fr om the ISP a nd enter it manuall y here. I f you ent er an addr ess here, you should reboot your PCs after configuring the firewall.
6. Router’s MAC Address:
This sectio n determines the Ethernet MAC address that will be used by t he firewall on the Internet port. Some ISPs will register the Ethe rne t M AC add res s of the network interface car d in your PC when your account is first opened. They will then only accept traffic from the MAC address of that PC. This feature allows your firewall to masquerade as that PC by “cloning” its MAC address.
To change the MAC address, select “Use this Computer’s MAC address.” The firewall will then capture and use the MAC address of the PC that you are now using. You must be using the one PC that is allowed by the ISP. Or, select “Use this MAC address” and enter it.
Connecting the Firewall to the Internet 2-15
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
7. Click Apply to save your settings.
8. Click on the Test button to test your Internet connection.
If the NETGEAR website does not appear within one minute, refer to Chapter 8,
Troubleshooting.
2-16 Connecting the Firewall to the Internet
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Configuring Wire less Connectivity
Use the procedure below to configure an Internet connection via the serial port of your firewall.
Procedure 2-8: Serial Port Internet Connection Configuration
There are three steps to configuring the serial port of your firewall for an Internet connection:
1. Connect the firewall to your ISDN or dial-up analog modem
2. Configure the firewall
3. Connect to the Internet
Follow the steps below to configure a serial port Internet connection on your firewall.
1. Connect the Firewall to your ISDN or dial-up modem a. Turn off your Modem and connect the cable (C) from your FR328S’s serial port to the
modem.
ISDN or
analog modem
C
MODEM
LOCAL
10/100M
87654321
INTERNET
12VDCO.5A
Figure 2-12: Connect the ISDN or analog modem to the firewall
b. Turn on the modem and wait about 30 seconds for the lights to stop blinking.
Connecting the Firewall to the Internet 2-17
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
2. Configure the Serial Port of the Firewall.
Note: T o conn ect to the fi rewall, your comput er needs to be conf igured to obt ain an IP addre ss automatically via DHCP. If you need instructions on how to do this, please refer to
Appendix C, "Preparing Your Network".
a. Use a browser to log in to the firewall at http://192.168.0.1 with its default User Name of
admin and default Password of password, or using whatever User Name, Password you
have set up. Note: The user name and password are not the same as any user name or password you
may use to log in to your Internet connection.
b. From the Setup menu, click the Serial Port link to display the menu below.
Figure 2-13: Setup Serial Port configuration menu
2-18 Connecting the Firewall to the Internet
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
c. Choose the type of Serial Port Usage:
Auto-rollover with a wait time in minutes
Primary Internet connection
d. Fill in the ISP Internet configuration parameters as appropriate:
For a Dial-up Account, enter the Account/User Name, Password, the Te lephone number to dial, an Alternative Telephone number if available. Check “Connect as required” to enable the fi rewall to automat ically dial the number . If you want to ena ble a Idle Time disconnect, check the box and enter a time in minutes.
To configure the TCP/IP settings, fill in whatever address parameters your ISP provided.
e. Conf igure the Modem parameters:
Figure 2-14: Modem configuration menu
Select the Serial Lin e Speed.
This is the maximum speed the modem will attempt to use. For ISDN permanent connections, the speeds are typically 64000 or 128000 bps. For dial-up modems, 56000 bps would be a typical setting.
—For ISDN, select “Permanent connection (leased line).” —For dial-up, select your modem from the list. —If your modem is not on the list, select “User Defined” and enter the Modem Properties.
Connecting the Firewall to the Internet 2-19
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Select the Modem Type
Figure 2-15: Modem Properties menu
If you are using the “Generic Modem” selection and configuring your own modem stings, fill in the Modem Properties settings. Note: You can validate modem string settings by first connecting the modem directly to a PC, establishing a connection to your ISP, and then copying the modem string settings from the PC configuration and pasting them into the FR328S Modem Properties Initial String field. For more information on this procedure, please refer to the support area of the NETGEAR web site.
f. Click Apply to save your settings.
3. Connect to the Internet to test your configuration.
a. If you have a broadband connection, disconnect it. b. From a workstation, open a browser and test your serial port Internet connection.
Note: The response time of your serial port Internet connection will be slower than a broadband Internet connection.
2-20 Connecting the Firewall to the Internet
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Testing Your Internet Connection
After completing the Internet connection configuration, your can test your Internet connection. Log in to the firewall, th en, from the Setup Basic Settings link, click on the Test button. If the NETGEAR website does not appear within one minute, refer to
Your firewall is now configured to provide Internet access for your network. Your firewall automatically connects to the Internet when one of your computers requires access. It is not necessary to run a dialer or login application such as Dial-Up Networking or Enternet to connect, log in, or disconnect. These functions are performed by the firewall as needed.
To access the Internet from any computer connected to your firewall, launch a browser such as Microsoft Internet Explorer or Netscape Navigator. You should see the firewall’s Internet LED blink, indicating communication to the ISP. The browser should begin to display a Web page.
The following chapter s descri be how to con figure t he Advanced f eatures of your firewal l, and how to troubleshoot problems that may occur.
Chapter 8, Troubleshooting.
Connecting the Firewall to the Internet 2-21
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
2-22 Connecting the Firewall to the Internet
Chapter 3
Protecting Your Network
This chapter describes how to use the basic firewall features of the FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall to protect your network.
Protecting Access to Your FVM318 firewall
For security reasons, the firewall has its own user name and password. Also, after a period of inactivity for a set length of time, the administrator login will automatically disconnect. When prompted, enter admin for the firewall User Name and password for the firewall Password. You can use procedures below to change the firewall's password and the amount of time for the administrator’s login timeout.
Note: The user name and password are not the same as any user name or password your may use
to log in to yo ur Internet connection. NETGEAR recommends that you change this password to a more secure password. The ideal
password should contain no dictionary words from any language, and should be a mixture of both upper and lower case letters, numbers, and symbols. Your password can be up to 30 characters.
Protecting Your Network 3-1
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 3-1: Changing the Built-In Password
1. Log in to the firewall at its default LAN address of http://192.168.0.1 with its default User
Name of LAN address you have chosen for the firewall.
2. From the Main Menu of the browser interface, under the Maintenance heading, select Set
Password to bring up the menu shown in
admin, default password of password, or using whatever User Name, Password and
Figure 3-1: Log in to the firewall
Figure 3-2.
Figure 3-2: Set Password menu
3. To change the password, first enter the old password, and then enter the new password twice.
4. Click Apply to save your changes.
Note: After changing the password, you will be required to log in again to continue the
configuration.
If you have backed up the firewall settings previously, you should do a new
backup so that the saved settings file includes the new password.
3-2 Protecting Your Network
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 3-1: Changing the Administrator Login Timeout
For security, the admini strator's log in to the firewall configuration will timeout after a period of inactivity. To change the login timeout period:
1. In the Set Password menu, type a number in ‘Administrator login times out’ field.The
suggested default value is 5 minutes.
2. Click Apply to save your changes or click Cancel to keep the current period.
Configuring Basic Firewall Services
Basic firewall services you can configure include access blocking and scheduling of firewall security. These topics are presented below.
Blocking Functions, Keywords, Sites, and Services
The firewall provides a variety of options for blocking Internet based content and
communications services. Those basic options include:
With its content filtering feature, the FVM318 firewall prevents objectionable co ntent from reaching your PCs. The FR114P allows you to control access to Internet content by screening for keywords within Web addresses. Key content filtering options include:
Keyword blocking of newsgroup names.
ActiveX, Java, cookie, and web proxy filtering.
ActiveX and Java programs can be embedded is websites, and will be executed by your computer. These programs may sometimes include malicious content.
Cookies are small files that a website can store on your computer to track your activity. Some cookies can be helpful, but some may compromise your privacy.
Web proxies are computers on the Internet that act as relays for browsing. A web proxy can be used to bypass your web blocking methods.
Outbound Services Blocking limits access from your LAN to Internet locations or services that you specify as off-limits.
Denial of Service (DoS) protection. Automatically detects and thwarts Denial of Service (DoS) attacks such as Ping of Death, SYN Flood, LAND Attack and IP Spoofing.
Protecting Your Network 3-3
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Blocks unwanted traffic from the Internet to your LAN.
Blocks access from your LAN to Internet locations that you specify as off-limits.
The section below explains how to configure your firewall to perform these functions.
Procedure 3-2: Block Functions, Keywords, and Sites
The FVM318 firewall allows you to restrict access to Internet content based on functions such as Java or Cookies, Web addresses and Web address keywords.
1. Log in to the firewall at its default LAN address of http://192.168.0.1 with its default User
Name of LAN address you have chosen for the firewall.
2. Click on the Block Sites link of the Security menu.
admin, default password of password, or using whatever User Name, Password and
Figure 3-3: Block Sites menu
3-4 Protecting Your Network
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
3. T o bl ock Acti veX, Java , Cookies , or Web Proxy functions for all Interne t sit es, click the che ck
box next to the function and then click Apply.
4. To enable keyword blocking, check “Turn keyword blocking on”, enter a keyword or domain
in the Keyword box, click Add Keyword, then click Apply. Some examples of Keyword application follow:
If the keyword “XXX” is specified, the URL <http://www.badstuff.com/xxx.html> is
blocked, as is the newsgroup alt.pictures.xxx.
If the keyword “.com” is specified , only websit es with other domain suf fixe s (such as .edu
or .gov) can be viewed.
Enter the keyword “.” to block all Internet browsing access. Up to 32 entries are supported in the Keyword list.
5. To delete a keyword or domain, sel ect it from the l is t, cl i ck Del et e Keywor d, t hen cl i ck Appl y.
6. To specify a Trusted User, enter that PC’s IP address in the Trusted User box and click Apply.
You may specify one Trusted User, which is a PC that will be exempt from blocking and logging. Since the Trusted User will be identified by an IP address, you should configure that PC with a fixed IP address.
Block Services
Firewalls are used to regulate specific traffic passing through from one side of the firewall to the other. You can restrict outbound (LAN to WAN) traffic to what outside resources you want local users to be able to access. In addition to the kind of blocking of sites discussed above, you can block services like Telnet or Instant Messenger.
By default, the FR114P regulates inbound and outbound traffic in these ways:
Inbound: Block all access from outside except responses to requests from the LAN side.
Outbound: Allow all access from the LAN side to the outside.
You may define exceptions to the default outbound settings by adding Block Services definitions to the Outbound Services table. In this way, you can block or allow access based on the service or application destination IP addresses, and time of day. You can also choose to log traffic that matches or does not match what you have defined.
Protecting Your Network 3-5
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 3-3: Block Services
1. Log in to the firewall at its default LAN address of http://192.168.0.1 with its default User
Name of LAN address you have chosen for the firewall.
2. Click on the Block Sites link of the Security menu to display the Block Services menu shown
in
admin, default password of password, or using whatever User Name, Password and
Figure 3-4:
Figure 3-4: Block Services menu
To create a new Block Services rule, click the Add button.
To edit an existing Block Services rule, select its button on the left side of the table and
click Edit.
To delete an existing Block Services rule, select its button on the left side of the table and
click Delete.
3. Modify the menu shown below for defining or editing a how a service is regulated.
Figure 3-5: Add Block Services menu
3-6 Protecting Your Network
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
The parameters are:
•Service
From this list, select the application or service to be allowed or blocked. The list already displays many common services, but you are not limited to these choices. Use the Add Services menu to add any additional services or applications that do not already appear.
Action
Choose how you would like this type of traffic to be handled. You can block or allow always, or you can choos e to bl ock or allo w accor ding to the s chedul e yo u have d efined i n the Schedule menu.
LAN Users Address
Specify traff ic origi nating on the LAN (outbo und), and ch oose whether you would l ike the traffic to be restricted by source IP address. You can select Any, a Single address, or a Range. If you select a range of addresses, enter the range in the start and finish boxes. If you select a single address, enter it in the start box.
•Log
You can select whether the traffic will be logged. The choices are:
Never - no log entries will be made for this service.
Always - any traffic for this service type will be logged.
Match - traffic of this type which matches the parameters and action will be logged.
Not match - traffic of this type which does not match the parameters and action will be logged.
4. Click Apply to save your definition.
Setting Times and Scheduling Firewall Services
The FVM318 firewall uses the Network Time Protocol (NTP) to obtain the current time and date from one of several Network Time Servers o n the Internet. In order to localize the time for your log entries, you must select your Time Zone from the list.
Procedure 3-4: Setting Your Time Zone
In order to localize the time for your log entries, you must specify your Time Zone:
Protecting Your Network 3-7
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
1. Log in to the firewall at its default LAN address of http://192.168.0.1 with its default User
Name of
admin, default password of password, or using whatever User Name, Password and
LAN address you have chosen for the firewall.
2. Click on the Schedule link of the Security menu to display menu shown below.
Figure 3-6: Schedule Services menu
3. Select your Time Zone. This setting will be used for the blocking schedule according to your
local time zone and for tim e-stamping log entries. Check the Daylight Savings Time box if your time zone is currently in daylight savings time. Note: If your region uses Daylight Savings Time, you must manually check Adjust for
Daylight Savings Time on the first day of Daylight Savings Time, and uncheck it at the end. Enabling Daylight Savings Time will cause one hour to be added to the standard time.
4. The firewall has a l ist of publicly availabl e NTP serve rs. If you would pref er to us e a parti cular
NTP server as the primary server, enter its IP address under Use this NTP Server.
5. Click Apply to save your settings.
3-8 Protecting Your Network
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 3-5: Scheduling Firewall Services
If you enabled services blocking in the Block Services menu or Port forwarding in the Ports menu, you can set up a schedule for when blocking occurs or when access isn't restricted.
1. Log in to the firewall at its default LAN address of http://192.168.0.1 with its default User
Name of LAN address you have chosen for the firewall.
2. Click on the Schedule link of the Security menu to display menu shown in the “Schedule
Services menu“ on page -8.
3. T o bl ock Inter net s ervic es base d on a s che dule, s elect Every Da y or se lect one or mor e days . If
you want to limit access completely for the selected days, select All Day. Otherwise, to limit access during certain times for the sele cted da ys, enter St art Blo cking and End Blocking times.
Note: Enter the values as 24-hour time. For example, 10:30 am would be 10 hours and 30
minutes and 10:30 pm would be 22 hours and 30 minutes.
4. Click Apply
admin, default password of password, or using whatever User Name, Password and
Protecting Your Network 3-9
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
3-10 Protecting Your Network
Chapter 4
Virtual Private Networking
This chapter describes how to use the virtual private networking (VPN) features of the FVM318 firewall. VPN communications paths are called tunnels. VPN tunnels provide secure, encrypted communications between your local network and a remote network or computer.
Network to Network and Remote Computer to Network VPNs
Two common scenarios for configuring VPN tunnels are between two or more networks, and between a remote computer and a network.
The FVS318 supports these configurations:
Figure 4-1: Secure access through FVS318 VPN routers
Secure access between networks, such as a branch or home office and a main office. A VPN between two or more NETGEAR VPN-enabled routers is a good way to connect
branch or home offices and business partners over the Internet. VPN tunnels also enable
Virtual Private Networking 4-1
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
access to network resources when NAT is enabled and remote computers have been assigned private IP addresses.
Secure access from a remote PC, such as a telecommuter connecting to an office network. VPN client access allows a remote PC to connect to your network from any location on the
Internet. In this case, the remote PC is one tunnel endpoint, running VPN client software. The FVM318 firewall router on your network is the other tunnel endpoint
The FVM318 firewall supports up to eight concurrent tunnels.
These scenarios are described below.
Note: The FVM318 firewall uses industry standard VPN protocols. However, due to
variations in how manufacturers interpret these standards, many VPN products are not interoperable. NETGEAR provide s support for con nections betwee n FVM318 firewalls, and between an FVM318 firewall and the SafeNet SoftRemote V PN Client for Windows. Although the FVS318 can interoperate with many other VPN products, it is not possible for NETGEAR to provid e specific technical support for every other interconnection. Please see NETGEAR's web site for additional VPN information.
Planning a VPN
When you set up a VPN, it is helpful to plan the network configuration and record the configuration parameters on a worksheet. These topics are discussed below.
VPN Configuration Choices
When planning your VPN, you must make a few choices first:
T o set up a VPN connec tion, you must con figure each endpo int wit h specif ic iden tifica tion and connection information describing the other endpoint. This set of configuration information defines a security association (SA) between the two points. The FVS318 is capable of eight Security Associations which are commonly referred to as tunnels.
Will the remote end be a network or a single PC? Note: To connect remote networks, the LAN IP address ranges of each connected network
must be different. The connection will not work if both ends are using the NETGEAR default address range of 192.168.0.x.
4-2 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
At least one side must have a fixed IP address. If one side has a dynamic IP address, the side with a dynamic IP address must always be the initiator of the connection.
Will you use the typical automated Internet Key Exchange (IKE) setup, or a Manual Keying setup in which you must specify each phase of the connection? IKE is an automated method for establishing a shared security policy and authenticated keys.
What level of encryption will you use, 56 bit DES or 168 bit 3DES? 3DES is more secure but the throughput will be slower.
Sample Network to Network VPN Tunnel Configuration Worksheet
The sample configuration worksheet below is filled in with the parameters used in the procedure examples below. A blank worksheet is provided below at
“Network to Network IKE VPN Tunnel
Configuration Worksheet” on page 4-26.
Table 4-1. Sample Network to Network IKE VPN Tunnel Configuration Worksheet
IKE Tunnel Security Association Settings
Connection Name:
PreShared Key:
Secure Association -- Main Mode or Aggressive Mode: Perfect Forward Secrecy:
Encryption Protocol -- Null, 56 bit DES, or 168 bit 3DES: Key Life in seconds: IKE Life Time in seconds:
VPNAB r>T(h4&3@#kB
Main Enabled DES
3600 (1 hour) 28800 (8 hours)
FVM318 firewall Network IP Settings
Network
LAN A LAN B
Virtual Private Networking 4-3
Local IPSec
Identifier
LAN_A 192.168.3.1 255.255.255.0 24.0.0.1 LAN_B 192.168.0.1 255.255.255.0 10.0.0.1
LAN IP
Network Address Subnet Mask
Gateway IP
(WAN IP Address)
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 4-1: Configuring a Network to Network VPN Tunnel
Follow this procedure to configure a VPN tunnel between two LANs via a FVS318 at each end.
A
Figure 4-2: LAN to LAN VPN access through an FVS318 to an FVS318
1. Set up the two LANs to have different IP address ranges.
The procedures below refer to the “Sample Network to Network IKE VPN Tunnel
Configuration Worksheet” on page 4-3.
To configure your actual network, print and fill out the blank “Net work to Network IKE VPN
Tunnel Configuration Worksheet” on page 4-26 for your network configuration. Then follow
the procedures below.
a. Log in to the first FVS318 firewall (A) at its default LAN address of http://192.168.0.1
with its default User Name of whatever User Name, Password you have set up.
admin and default Password of password, or using
B
Figure 4-3: Log in
4-4 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
b. Click the LAN IP Setup link from the Advanced section of the main menu to display the
menu show n in
Figure 4-4.
Figure 4-4: Configuring the Local LAN (A) via the LAN IP Setup Menu
c. Change the settings as follows:
IP Address to 192.168.3.1
DHCP Starting Address to 192.168.3.2
DHCP Ending Address to 192.168.3.100
Change any Reserved IP Addresses to be part of the 192.168.3.x network Note: If Port Forwarding, Trusted User, or Static Routes are set up, you will need to
change these configurations to match the 192.168.3.x network as well.
Virtual Private Networking 4-5
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
d. Click Apply.
Because you changed the firewall’s IP address, you are now disconnected.
e. Reboot all PCs on network A. The network configuration should now look like this:
A
192.168.3.1
Figure 4-5: Local LAN (A) configuration
2. Configure the VPN Settings of the FVS318 firewall (A) on the local LAN. a. Log in to the first FVS318 router (A) at its new LAN address of http://192.168.3.1 with its
default User Name of
admin and default Password of password, or using whatever User
B
192.168.0.1
Name and Password you set up.
b. From the Setup menu, click the VPN Settings link. The VPN Settings window opens as
shown in
Figure 4-6 below:
Figure 4-6: VPN Settings menu
4-6 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
c. Click the button next to an unused tunnel profile in the table and click Edit.
The VPN Settings - Main Mode window opens as shown in Figure 4-7 below:
Figure 4-7: LAN A VPN Settings - Main Mode IKE Edit menu
d. Fill in the Connection N ame VPN settings.
In the Connection Name box, type the name for the Security Association of LANs A and B. For example, enter VPNAB as the Connection Name.
Enter the unique Local IPSec Identifier name for the local FVS318 (A). For example, enter LAN_A.
Note: This IPSec name must not be used in any other SA definitions in this VPN network.
Enter the unique Remote IPSec Identifier name for the remote FVS318 (B).For example, enter LAN_B.
Enter the Remote IP Address and IP Subnet Mask. In this case, the Remote network address is the LAN network address of the second FVS318 (B), which is 192.168.0.1 and the Subnet Mask is 255.255.255.0.
Virtual Private Networking 4-7
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Enter the Remote Gateway IP Address which is the WAN IP Address for the second FVS318 (B). In this ex ample, use 10.0.0.1 for the Gateway IP Address.
You can look up the Remote Gateway IP Address by viewing the WAN Status screen of the second FVS318 (B). When FVS318 (B) is connected to the In ternet, log in, go go to its Maintenance menu Router Status link. If you find the WAN Port DHCP field says “DHCP Client” or “PPPOE,” then it is a dynamic addr ess. For a dynamic address enter 0.0.0.0 in the configuration screen of the FVS318 on LAN A as the WAN IP Address for the FVS318 on LAN (B).
Note: Only one side may have a dynamic IP address, and that side must always initiate the connection.
e. Under Secure Association, select Main Mode, unless you are connecting to a device that
requires Agg ressive Mode, and fill in the settings below. Note: The alternative to IKE is Manual Keying which is covered “Using Manual Keying
as an Alternative to IKE” on page 4-24.
To configure the IKE settings for firewall A, enter the following:
Enable Perfect Forward Secrecy.
For Encryption Protocol, select: DES.
Enter the PreShared Key. In this example, r>T(h4&3@#kB is the PreShared Key. With IKE, a preshared key that you make up is used for mutual identification. The PreShared Key should be between 8 and 80 characters, and the letters are case sensitive. Entering a combination of letters, numbers and symbols, such as r>T(h4&3@#kB provides greater security.
Key Life - Default is 3600 seconds (1 hour)
IKE Life Time - Default is 28800 seconds (8 hours). A shorter time increases security, but users will be temporarily disconnected upon renegotiation.
f. If you need to run Microsoft networking functions such as Network Neighborhood, click
the NETBIOS Enable check box to allow NETBIOS traffic over the VPN tunnel.
g. Click Apply to save the Security Association tunnel settings into the table.
4-8 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
3. Configure the VPN Settings of the FVS318 firewall (B) on the remote LAN.
To configure the second FVS318 (B), refer to the configuration worksheet and do the following:
a. Log in to the FVS318 router (B) at its default LAN address of http://192.168.0.1 with its
default User Name of
admin and default Password of password, or using whatever User
Name and Password you set up.
b. From the Setup menu, click the VPN Settings link. The VPN Settings window opens. c. Click the button next to an unused profile in the table and click Edit.
The VPN Settings - Main Mode window opens as shown in Figure 4-8 below:
Figure 4-8: LAN B VPN Settings - Main Mode IKE Edit menu
d. Fill in the Connection N ame VPN settings.
In the Connection Name box, type the same Security Association name of LANs A and B you entered for LAN A. In this case, enter VPNAB as the Connection Name.
Enter the unique IPSec Identifiers. In this example, enter LAN_B as the Local IPSec Identifier name for t he local FVS318 (B), and LAN_B as the Remote IP Sec Identifier name for the FVS318 (A).
Virtual Private Networking 4-9
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Enter the Remote IP Address and the Remote IP Subnet Mask. In this example, 192.168.3.1 is the Remote network address, which is the LAN network address of the first FVS318 (A), and 255.255.255.0 is the Subnet Mask.
Type the Remote Gatew ay IP Addres s, which is the WAN IP address of the first FVS318 (A). In this example, 24.0.0.1 is the Remote Gateway.
You can look up the Remote Gateway IP Address by viewing the WAN Status screen of the second FVS318 (A). When FVS318 (A) is connected to the Internet, log in, go to its Maintenance menu Router Status link. If you find the WAN Port DHCP field says “DHCP Client” or “PPPOE,” then it is a dynamic addr ess. For a dynamic address enter 0.0.0.0 in the configuration screen of the FVS318 on LAN B as the WAN IP Address for the FVS318 on LAN (A).
Note: Only one side may have a dynamic IP address, and that side must always initiate the connection.
e. Under Secure Association, select Main Mode, unless you are connecting to a device that
requires Agg ressive Mode, and fill in the settings below.
Enable Perfect Forward Secrecy.
For Encryption Protocol, select: Null.
•Enter r>T(h4&3@#kB as the PreShared Key
Key Life - Default is 3600 seconds (1 hour)
IKE Life Time - Default is 28800 seconds (8 hours).
f. If you need to run Microsoft networking functions such as Network Neighborhood, click
the NETBIOS Enable check box to allow NETBIOS traffic over the VPN tunnel.
g. Click Apply to save the Security Association tunnel settings into the table.
4-10 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Procedure 4-2: Check the VPN Connection
To check the VPN Connection, you can initiate a request from one network to the other. If one FVS318 has a dynamically assigned WAN IP address, you must initiate the request from that FVS318’s network. The simplest method is to ping the LAN IP address of the other FVS318.
1. Using our example, from a PC attached to the FVS318 on LAN A, on the Windows taskbar
click the Start button, and then click Run.
2. Type ping -t 192.168.0.1 , and then click OK.
Figure 4-9: Running a Ping test from Windows
3. This will cause a continuous ping to be sent to the first FVS318. After between several
seconds and two minutes, the ping response should change from “timed out” to “reply.”
Figure 4-10: Ping test results
At this point the connection is established.
Using the VPN Connection
Now that your VPN connection is working, whenever a PC on the second LAN n eeds to access an IP address on the first LAN, the firewalls will automatically establish the connection.
Virtual Private Networking 4-11
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Configuring a Remote PC to Network VPN
This proce dure describes linking a remote PC and a LAN. The LAN will connect to the Internet using an FVS318 with a fi xed IP ad dress. The PC can be connected to the Internet through di al up, cable or DSL modem, or other means, and we will assume it has a dynamically assigned IP address.
The PC must have a VPN client program that supports IPSec. NETGEAR recommends and supports the SafeNe t SoftRemot e (or So ft-PK) Se cure VPN Cli ent for Windows, Version 5 or later. The SafeNet VPN Client can be purchased from SafeNet at
Sample PC to Network VPN Tunnel Configuration Worksheet
The sample configuration worksheet below is filled in with the parameters used in the procedure examples below. A blank worksheet is at,
“PC to Network IKE VPN Tunnel Settings
Configuration Worksheet” on page 4-27.
Table 4-2: Sample PC to Network IKE VPN Tunnel Settings Configuration Worksheet
IKE Tunnel Security Association Settings
Connection Name:
PreShared Key:
Secure Association -- Main Mode or Aggressive Mode: Perfect Forward Secrecy: Encryption Protocol -- Null, 56 bit DES, or 168 bit 3DES: Key Life in seconds: IKE Life Time in seconds:
http://www.safenet-inc.com.
VPNLANPC r>T(h4&3@#kB Main Enabled DES 3600 (1 hour) 28800 (8 hours)
FVM318 firewall Network and PC IP Settings
Local IPSec
Identifier
Network: LAN A
Computer: PC
4-12 Virtual Private Networking
LANAPCIPSEC 192.168.3.1 255.255.255.0 24.0.0.1
PCIPSEC
LAN IP
Network Address Subnet Mask
192.168.100.2
255.255.255.255 0.0.0.0
Gateway IP
(WAN IP Address)
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Note: If your situation is different, for example, if your remote PC is connected through a simple
cable/DSL router, or if you wish to use diffe rent VPN clie nt soft ware , please refer to NETGEAR's web site fo r additional VPN applications information.
Procedure 4-3: Configuring a Remote PC to Network VPN
A
192.168.3.1
1. Configure the VPN Tunnel on the FVS318 (A) firewall.
To configure the firewall, follow these steps:
a. From the Setup Menu, click the VPN Settings link to open the window in Figure 4-6:
Figure 4-11: VPN Settings Window
Virtual Private Networking 4-13
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
b. Click the button next to an unused profile in the table and click Edit.
The VPN Settings - IKE window opens as shown in Figure 4-12 below:
Figure 4-12: VPN Edit menu for connecting with a VPN client
c. Choose Main Mode for IKE automated method for establishing a shared security policy
and authenticated keys.
d. Type VPNLANPC in the Connection Name box for this Security Association tunnel.
Note: This name must match the name of the Se curity Asso ciation defined in the VPN client on the remote PC.
e. Enter LANAPCIPSEC as the Local IPSec Identifier for the FVS318 on LAN A.
Note: This IPSec name must not be us ed i n any other SA definitions in thi s VPN ne twor k.
f. Enter PCIPSEC as the Remote IPSec Identifier for the PC. g. In this case, the remote network is a single PC, and its IP address is unknown since it will
usually be assigned dynamically by the user’s ISP. We will choose an arbitrary “fixed virtual” IP address to define this connection. This IP address will be used in the configuration of the VPN client. For this example, enter 192.168.100.2 as the Remote IP Network.
4-14 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
h. Since the remote network is a single PC, enter 255.255.255.255 for the Subnet Mask. i. Since the remote PC has a dynamically assigned IP address, enter 0.0.0.0 as the Remote
Gateway IP Address.
Note: Only one side may have a dynamic IP address, and that side must always initiate the
connection.
j. Under Secure Association, for IKE, select Main Mode, unless you are connecting to a
device that requires Aggressive Mode, and fill in the settings b elow.
k. Enable Perfect Forward Secrecy. l. For Encryption Protocol, select: DES m. Enter the case sen sitive PreSh ared Key: r>T(h4&3@#kB
This combination of letters, numbers and symbols, provides greater security.
n. Key Life - Default is 3600 seconds (1 hour) o. IKE Life Time - Default is 28800 seconds (8 hours).
A shorter time increases security, but users will be temporarily disconnected upon renegotiation.
p. If you need to run Microsoft networking functions such as Network Neighborhood, click
the NETBIOS Enable check box to allow NETBIOS traffic over the VPN tunnel.
q. Click Apply to save the Security Association tunnel settings into the table.
2. Install the SafeNet VPN Client Software on the PC.
a. Install the SafeNet Secure VPN Client.
Note: You may need to insert your Windows CD to complete the installation. —If you do not have a modem or dial-up adapter installed in your PC, you may see the
warning message stating “The SafeNet VPN Component requires at least one dial-up adapter be installed.” You can disregard this message.
—Install the IPSec Component. You may have the option to install either or both of the VPN Adapter or the IPSec Component. The VPN Adapter is not necessary.
b. Reboot your PC after installing the client software.
Virtual Private Networking 4-15
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
3. Configure the SafeNet software via its Security Policy Editor
a. Run the SafeNet S ecurity Polic y Editor pro gram and, using the “Sample PC to Network
IKE VPN Tunnel Settings Configuration Worksheet” on page 4-12, create a VPN
Connection.
Figure 4-13: Security Policy Editor New Connection
From the E dit menu of the Security Policy Editor, click Add, then Connection. A “New Connection” listing appears in the list of policies.
Rename the “New Connection” so that it matches the Connection Name you entered in the VPN Settings of the FVS318 (A). In this exa mple, it woul d be
VPNLANPC.
In the Connection Security box, select Secure.
In the ID Type menu, select IP Subnet.
In the Subnet field, type 192.168.3.0 for the networ k address of the FVS318. In this example, 192.168.3.0 would be used. The network address is the LAN IP Address of the FVS318 with 0 as the last number.
In the Mask field, type 255.255.255.0 as the LAN Subnet Mask of the FVS318
In the Protocol menu, select All to allow all traffic through the VPN tunnel.
•Check the Connect using Secure Gateway Tunnel checkbox.
In the ID Type menu below the checkbox, select IP Address.
4-16 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Enter the public (WAN) IP Addre ss of the FVS318 in the field directly below the ID Type menu. In this example,
4. Configure the Security Policy in the SafeNet VPN Client Software.
a. In the Network Security Policy list, expand the new connection by double clicking its
24.0.0.1 would be used.
name or clicking on the “+” symbol. My Identity and Security Policy subheadings appear below the connection name.
b. Click on the Security Policy subheading to show the Security Policy menu.
Figure 4-14: Security Policy Editor Security Policy
c. In the Select Phase 1 Negotiation Mode box, select Main Mode. d. Check the Enable Perfect Forward Secrecy (PFS) checkbox. e. For PFS Key Group, select Diffie-Helman Group 1. f. Check the Enable Replay Detection checkbox.
Virtual Private Networking 4-17
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
g. From the Options menu at the top of the Security Policy Editor window, select Global
Policy Settings.
Figure 4-15: Security Policy Editor Global Policy Options
h. Increase the Retransmit Interval period to 45 seconds. i. Check the Allow to Specify Internal Network Address checkbox and click OK.
5. Configure the VPN Client Identity
In this step, you will provide information about the remote VPN client PC. You will need to provide:
The PreShared Key that you configured in the FVS318.
Either a fixed IP address or a “fixed virtual” IP address of the VPN client PC.
4-18 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
a. In the Network Se curity Policy list on the left side of the Security Poli cy Editor window,
click on My Identity.
Figure 4-16: Security Policy Editor My Identity
b. In the Select Certificate menu, choose None. c. In the ID Type menu, select IP Address. d. If you are using a “virtual fixed” IP address as discussed in “Configuring a Remote PC to
Network VPN“ on page 4-13, enter this address in the Internal Network IP Address box.
Otherwise, leave this box empty. For this example, use 192.168.100.2.
e. In the Internet Interface box, select the adapter you use to access the Internet. Select PPP
Adapter in the Name menu if you have a dial-up Internet account. Select your Ethernet adapter if you have dedicated Cabl e or DSL line . You may also choose Any if you will be switching between adapters or if you have only one adapter.
f. Click the Pre-Shared Key button. In the Pre-Shared Key dialog box, click the Enter Key
button. Enter the FVS318's Pre-Shared Key and click OK. In this example, r>T(h4&3@#kB would entered. Note that this field is case sensitive.
Virtual Private Networking 4-19
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
6. Configure VPN Client Authentication Proposal.
These settings do not depend on your network information.
a. In the Network Se curity Policy list on the left side of the Security Poli cy Editor window,
expand the Security Policy heading by double clicking its name or clicking on the “+” symbol.
b. Expand the Authentication subheading by double clicking its name or clicking on the “+”
symbol. Then select Proposal 1 below Authentication.
c. In the Authentication Method menu, select Pre-Shared key. d. In the Encrypt Alg menu, select DES. e. In the Hash Alg menu, select MD5. f. In the S A Life menu, select Unspecified. g. In the Key Group menu, select Diffie-Hellman Group 1.
7. Configure the VPN Client Key Exchange Proposal.
In this step, you will provide the type of encryption (DES or 3DES) to be used for this connection. This selection must match your selection in the FVS318 configuration.
a. Expand the Key Exchange subheading by double clicking its name or clicking on the “+”
symbol. Then select Proposal 1 below Key Exchange.
b. In the SA Life menu, select Unspecified. c. In the Compression menu, select None. d. Check the Encapsulation Protocol (ESP) checkbox. e. In the Encrypt Alg menu, select the type of encryption to correspond with what you
configured for the Encryption Protocol in the FVS318 in
“Configuring a Remote PC to
Network VPN“ on page 4-13. In this example, use DES.
f. In the Hash Alg menu, select MD5. g. In the Encap sulation menu, select Tunnel. h. Leave the Authentication Protocol (AH) checkbox unchecked.
8. Save the VPN Client Settings.
a. From the File menu at the top of the Security Poli cy Edi tor wind ow, select Save Changes.
After you have configured and saved the VPN client information, your PC will automatically open the VPN connection when you attempt to access any IP addresses in the range of the remote VPN router’s LAN.
4-20 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Check the VPN Connection
To check the VPN Connection, you can initiate a request from the remote PC to the FVS318’s network. Since the remo te PC has a dynamically assigned WAN IP addre ss, it must initiate the request. The simplest method is to ping from the remote PC to the LAN IP address of the FVS318. Using our example, start from the remote PC:
1. Establish an Internet connection from the PC.
2. On the Windows taskbar, click the Start button, and then click Run.
3. Type ping -t 192.168.3.1 , and then click OK.
Figure 4-17: Running a Ping test to LAN a from the PC
Virtual Private Networking 4-21
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
This will cause a continuous ping to be sent to the first FVS318. After between several seconds and two minutes, the ping response should change from “timed out” to “reply.”
Figure 4-18: Ping test results
Once the connection is es tabli shed, you can open the browser of the remote PC and en te r the LAN IP Address of the remote FVS318. After a short wait, you should see the login screen of the firewall.
Monitoring the PC to Network VPN Connection Using SafeNet Tools
Information on the progre ss and s tatus of th e VPN clie nt conn ect ion ca n be vie wed by openin g the SafeNet Connection Monitor or Log Viewer. To launch these functions, click on the Windows Start button, then select Programs, then SafeNet Soft-PK, then either the Connection Monitor or Log Viewer.
The Log Viewer screen for a successful connection is shown below:
Figure 4-19: Log Viewer screen
4-22 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
The Connection Monitor screen for this connection is shown below:
Figure 4-20: Connection Monitor screen
In this example:
The FVS318 has a public IP WAN address of 134.177.100.11
The FVS318 has a LAN IP address of 192.168.0.1
The VPN client PC has a dynamically assigned address of 12.236.5.184
The VPN client PC is using a “virtual fixed” IP address of 192.168.100.100
While the connection is being established, the Connection Name field in this menu will say “SA” before the name of t he conne ction . When t he conn ectio n is suc ces sful, the “SA” will c hange t o the yellow key symbol shown in the illustration above.
Note: While your PC is conne cted to a remote LAN thr ough a VPN, you mi ght not hav e
normal Internet access. If this is the case, you will need to close the VPN connection in order to have normal Internet access.
Deleting a Security Association
To delete a security association:
1. Log in to the firewall.
1. Click on the VPN Settings link.
2. In the VPN Settings Security Associatio n table, select the radio button for the security
association to be deleted.
3. Click on the Delete button.
4. Click on the Update button.
Virtual Private Networking 4-23
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Manual Keying
As an alternative to IKE, you may use Manual Keying, in which you must specify each phase of the connection. Follow the steps to configure Manual Keying.
Procedure 4-4: Using Manual Keying as an Alternative to IKE
1. When editing the VPN Settings, you may select manual keying. At that time, the edit menu
changes to look like
Figure 4-21:
Figure 4-21: VPN Edit menu for Manual Keying
2. Incoming SPI - Enter a Security Parameter Index that the remote host will send to identify the
Security Association (SA). This will be the remote host’s Outgoing SPI.
3. Outgoing SP I - Enter a Security Parameter Index th at this firewa ll will send to identify the
Security Association (SA). This will be the remote host’s Incoming SPI.
4-24 Virtual Private Networking
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
The SPI should be a string o f hexade cima l [0-9 ,A-F] cha racte rs, and s hould no t be use d in a ny other Security Association.
Tip: For simplicity or troubleshooting, the Incoming and Outgoing SPI can be identical.
4. For Encryption Protocol, select one: a. Null - Fastest, but no security. b. DES - Faster but less secure than 3D ES. c. 3DES - (Triple DES) Most secure.
5. Enter a hexadecimal Encryption Key
— For DES, enter 16 hexadecimal [0-9,A-F] characters. — For 3DES, en ter 48 hexade cimal [0-9,A-F] characters. The encryption key must match exactly the key used by the remote router or host.
6. Select the Authentication Protocol
— MD5 (default) - 128 bits, faster but less secure. — SHA-1 - 160 bits, slower but more secure.
7. Enter 32 hex adecimal characters for th e Authentication Key
The authentication key must match exactly the key used by the remote router or host.
8. Click the NETBIOS Enable check box to allow NETBIOS over the VPN tun nel.
9. Click Apply to enter the SA into the table.
Virtual Private Networking 4-25
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Blank VPN Tunnel Configuration Worksheets
The blank configuration worksheets below are provided to aid you in collecting and recording the parameters used in the VPN configuration procedure.
Table 4-3: Network to Network IKE VPN Tunnel Configuration Worksheet
IKE Tunnel Security Association Settings
Connection Name:
PreShared Key:
Secure Association -- Main Mode or Aggressive Mode: Perfect Forward Secrecy:
Encryption Protocol -- Null, 56 bit DES, or 168 bit 3DES: Key Life in seconds: IKE Life Time in seconds:
FVS318 Network IP Settings
Network
Local IPSec
Identifier
4-26 Virtual Private Networking
LAN IP
Network Address Subnet Mask
Gateway IP
(WAN IP Address)
Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Table 4-4: PC to Network IKE VPN Tunnel Settings Configuration Worksheet
IKE Tunnel Security Association Settings
Connection Name:
PreShared Key:
Secure Association -- Main Mode or Aggressive Mode: Perfect Forward Secrecy:
Encryption Protocol -- Null, 56 bit DES, or 168 bit 3DES: Key Life in seconds: IKE Life Time in seconds:
PC and FVS318 Network IP Settings
Local IPSec
Identifier
Network:
LAN IP
Network Address Subnet Mask
Gateway IP
(WAN IP Address)
PC:
Virtual Private Networking 4-27
Loading...