ix
v1.0, August 2006
Inbound Rules Examples .......................................................................................4-16
LAN WAN Inbound Rule: Hosting A Local Public Web Server ........................4-16
LAN WAN Inbound Rule: Allowing Videoconference from Restricted Addresses 4-17
LAN WAN or DMZ WAN Inbound Rule: Setting Up One-to-One NAT Mapping 4-17
LAN WAN or DMZ WAN Inbound Rule: Specifying an Exposed Host .............4-19
Outbound Rules Example ......................................................................................4-20
LAN WAN Outbound Rule: Blocking Instant Messenger .................................4-20
Adding Customized Services .................................................................................4-21
Setting Quality of Service (QoS) Priorities .............................................................4-23
Setting a Schedule to Block or Allow Specific Traffic ....................................................4-24
Setting Block Sites (Content Filtering) ..........................................................................4-25
Enabling Source MAC Filtering ....................................................................................4-27
Port Triggering ..............................................................................................................4-28
E-Mail Notifications of Event Logs and Alerts ...............................................................4-31
Administrator Tips .........................................................................................................4-35
Chapter 5
Virtual Private Networking
Dual WAN Port Systems .................................................................................................5-1
Setting up a VPN Connection using the VPN Wizard .....................................................5-3
Creating a VPN Tunnel to a Gateway ......................................................................5-4
Creating a VPN Tunnel Connection to a VPN Client ...............................................5-7
VPN Tunnel Policies .....................................................................................................5-10
IKE Policy ...............................................................................................................5-10
Managing IKE Policies ..................................................................................... 5-11
IKE Policy Table ............................................................................................... 5-11
VPN Policy .............................................................................................................5-12
Managing VPN Policies ...................................................................................5-12
VPN Policy Table .............................................................................................5-13
VPN Tunnel Connection Status ..............................................................................5-13
Creating a VPN Gateway Connection: Between FVX538 and FVS338 .......................5-14
Configuring the FVX538 .........................................................................................5-14
Configuring the FVS338 .........................................................................................5-19
Testing the Connection ...........................................................................................5-20
Creating a VPN Client Connection: VPN Client to FVX538 ..........................................5-20
Configuring the FVX538 .........................................................................................5-20