ix
v1.0, August 2006
Inbound Rules Examples
.......................................................................................
4-16
LAN WAN Inbound Rule: Hosting A Local Public Web Server
........................
4-16
LAN WAN Inbound Rule: Allowing Videoconference from Restricted Addresses 4-17
LAN WAN or DMZ WAN Inbound Rule: Setting Up One-to-One NAT Mapping 4-17
LAN WAN or DMZ WAN Inbound Rule: Specifying an Exposed Host
.............
4-19
Outbound Rules Example
......................................................................................
4-20
LAN WAN Outbound Rule: Blocking Instant Messenger
.................................
4-20
Adding Customized Services
.................................................................................
4-21
Setting Quality of Service (QoS) Priorities
.............................................................
4-23
Setting a Schedule to Block or Allow Specific Traffic
....................................................
4-24
Setting Block Sites (Content Filtering)
..........................................................................
4-25
Enabling Source MAC Filtering
....................................................................................
4-27
Port Triggering
..............................................................................................................
4-28
E-Mail Notifications of Event Logs and Alerts
...............................................................
4-31
Administrator Tips
.........................................................................................................
4-35
Chapter 5
Virtual Private Networking
Dual WAN Port Systems
.................................................................................................
5-1
Setting up a VPN Connection using the VPN Wizard
.....................................................
5-3
Creating a VPN Tunnel to a Gateway
......................................................................
5-4
Creating a VPN Tunnel Connection to a VPN Client
...............................................
5-7
VPN Tunnel Policies
.....................................................................................................
5-10
IKE Policy
...............................................................................................................
5-10
Managing IKE Policies
.....................................................................................
5-11
IKE Policy Table
...............................................................................................
5-11
VPN Policy
.............................................................................................................
5-12
Managing VPN Policies
...................................................................................
5-12
VPN Policy Table
.............................................................................................
5-13
VPN Tunnel Connection Status
..............................................................................
5-13
Creating a VPN Gateway Connection: Between FVX538 and FVS338
.......................
5-14
Configuring the FVX538
.........................................................................................
5-14
Configuring the FVS338
.........................................................................................
5-19
Testing the Connection
...........................................................................................
5-20
Creating a VPN Client Connection: VPN Client to FVX538
..........................................
5-20
Configuring the FVX538
.........................................................................................
5-20