Quick Reference Guide
Contents iii
May 2004, 202-10030-02
Inbound Rules (Port Forwarding) .............................................................................5-7
Example: Port Forwarding to a Local Public Web Server ..................................5-8
Example: Port Forwarding for Videoconferencing .............................................5-8
Example: Port Forwarding for VPN Tunnels when NAT is Off ...........................5-9
Outbound Rules (Service Blocking or Port Filtering) ..............................................5-10
Outbound Rule Example: Blocking Instant Messaging ....................................5-10
Other Rules Considerations .........................................................................................5-11
Order of Precedence for Rules .............................................................................. 5-11
Rules Menu Options ...............................................................................................5-12
Using a Schedule to Block or Allow Content or Traffic .................................................5-13
Setting the Time Zone ............................................................................................5-14
Set Clock ................................................................................................................5-14
Enable NTP (Network Time Protocol) ....................................................................5-14
User-defined NTP Server .......................................................................................5-15
Getting E-Mail Notifications of Event Logs and Alerts ..................................................5-15
Viewing Logs of Web Access or Attempted Web Access .............................................5-17
What to Include in the Event Log ...........................................................................5-19
Chapter 6
Virtual Private Networking
Overview of FVL328 Policy-Based VPN Configuration ..................................................6-1
Using Policies to Manage VPN Traffic .....................................................................6-1
Using Automatic Key Management ..........................................................................6-2
IKE Policies’ Automatic Key and Authentication Management ................................6-3
VPN Policy Configuration for Auto Key Negotiation .................................................6-6
VPN Policy Configuration for Manual Key Exchange ...............................................6-9
Using Digital Certificates for IKE Auto-Policy Authentication .......................................6-14
Certificate Revocation List (CRL) ...........................................................................6-15
How to Use the VPN Wizard to Configure a VPN Tunnel .............................................6-15
Walk-Through of Configuration Scenarios ....................................................................6-18
VPNC Scenario 1: Gateway-to-Gateway with Preshared Secrets .........................6-19
FVL328 Scenario 1: How to Configure the IKE and VPN Policies .........................6-21
How to Check VPN Connections ...........................................................................6-26
FVL328 Scenario 2: Authenticating with RSA Certificates .....................................6-27










