Multi-Tech Systems RF660 Network Card User Manual


 
Table of Contents
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 5
Packet Filters................................................................................................................................................................. 101
Packet Filters > Packet Filter Rules......................................................................................................................101
Packet Filters > ICMP...........................................................................................................................................103
Packet Filters > Advanced....................................................................................................................................104
Packet Filters > Enable/Disable Log.....................................................................................................................105
VPN (Virtual Private Networks)...................................................................................................................................... 106
VPN > IPSec.........................................................................................................................................................106
Introduction to Virtual Private Networks................................................................................................................106
VPN > x.509 Certificates.......................................................................................................................................111
VPN > IPSec Bridging ..........................................................................................................................................111
VPN > PPTP.........................................................................................................................................................112
Wizard Setup................................................................................................................................................................. 114
Statistics & Logs............................................................................................................................................................ 116
Statistics & Logs > Uptime....................................................................................................................................117
Statistics and Logs > Hardware............................................................................................................................117
Statistics and Logs > Networks.............................................................................................................................118
Statistics & Logs > Interfaces ...............................................................................................................................120
Statistics & Logs > SMTP Proxy...........................................................................................................................121
Statistics & Logs > Accounting .............................................................................................................................122
Statistics & Logs > Self Monitor............................................................................................................................123
Statistics & Logs > IPSec......................................................................................................................................124
Statistics & Logs > PPTP......................................................................................................................................124
Statistics & Logs > Packet Filter ...........................................................................................................................125
Statistics & Logs > Port Scans..............................................................................................................................126
Statistics & Logs > View Logs...............................................................................................................................126
Statistics & Logs > HTTP Access.........................................................................................................................127
Statistics & Logs > DHCP.....................................................................................................................................128
Statistics & Logs > SMTP & POP3 Virus Quarantines..........................................................................................129
Statistics & Logs > SMTP SPAM Quarantines......................................................................................................129
Statistics & Logs > Administrative Authentication Log..........................................................................................129
Chapter 7 – User Authentication Methods......................................................................................................130
Proxy Services and Authentication Methods ........................................................................................................130
Which Method Should You Choose?....................................................................................................................130
Authentication Setup...................................................................................................................................................... 131
Setting Up RADIUS Authentication.......................................................................................................................131
Setting Up A Microsoft IAS RADIUS Server .........................................................................................................131
Setting Up NT/2000 SAM (SMB) Authentication...................................................................................................132
Chapter 8 – Frequently Asked Questions (FAQs).......................................................................................... 133
Chapter 9 – Troubleshooting ........................................................................................................................... 139
Appendix A – Disposition of Events for the RouteFinder v3.2x...................................................................141
1. Abstract ..................................................................................................................................................................... 142
II. Inbound Access Log .................................................................................................................................................. 143
III. Outbound Access Log .............................................................................................................................................. 145
IV. Access Requests through Firewall Dropped ............................................................................................................ 146
V. Access Requests to Firewall Dropped....................................................................................................................... 146
VI. Administrative Authentication Logs .......................................................................................................................... 147
VII. Admin Port Access Log........................................................................................................................................... 147
VIII. Startup History Log................................................................................................................................................. 147
IX. User Log................................................................................................................................................................... 147