Contents
ix
v1.0, March 2009
Setting a Schedule to Block or Allow Specific Traffic
....................................................
4-20
Setting Block Sites (Content Filtering)
..........................................................................
4-20
Enabling Source MAC Filtering
....................................................................................
4-23
IP/MAC Binding
......................................................................................................
4-24
Setting Up Port Triggering
............................................................................................
4-26
Bandwidth Limiting
.......................................................................................................
4-28
E-Mail Notifications of Event Logs and Alerts
...............................................................
4-30
Administrator Information
.............................................................................................
4-34
Chapter 5
Virtual Private Networking
Considerations for Dual WAN Port Systems
..................................................................
5-1
Using the VPN Wizard for Client and Gateway Configurations
......................................
5-2
Creating Gateway to Gateway VPN Tunnels with the Wizard
.................................
5-2
Creating a Client to Gateway VPN Tunnel
...............................................................
5-5
Use the VPN Wizard Configure the Gateway for a Client Tunnel
......................
5-6
Use the NETGEAR VPN Client Security Policy Editor to Create a Secure Connection
5-7
Testing the Connections and Viewing Status Information
.............................................
5-11
NETGEAR VPN Client Status and Log Information
...............................................
5-11
FVS338 VPN Connection Status and Logs
............................................................
5-13
IKE Policies
..................................................................................................................
5-14
IKE Policy Operation
..............................................................................................
5-14
IKE Policy Table
.....................................................................................................
5-15
VPN Policies
.................................................................................................................
5-16
VPN Policy Operation
............................................................................................
5-16
VPN Policy Table
....................................................................................................
5-16
VPN Tunnel Connection Status
..............................................................................
5-17
Extended Authentication (XAUTH) Configuration
.........................................................
5-18
Configuring XAUTH for VPN Clients
......................................................................
5-19
User Database Configuration
.................................................................................
5-20
RADIUS Client Configuration
.................................................................................
5-21
Assigning IP Addresses to Remote Users (ModeConfig)
.............................................
5-23
ModeConfig Operation
...........................................................................................
5-24
Setting Up ModeConfig
..........................................................................................
5-24
Configuring the ProSafe VPN Client for ModeConfig
.............................................
5-28