Quick Reference Guide

ProSafe VPN Firewall 200 FVX538 Reference Manual
Router and Network Management 6-13
v1.0, March 2009
Web browser access normally uses the standard HTTP service port 80. For greater security,
you can change the remote management Web interface to a custom port by entering that
number in the box provided. Choose a number between 1024 and 65535, but do not use the
number of any common service port. The default is 8080, which is a common alternate for
HTTP.
5. Click Apply to have your changes take effect.
When accessing your firewall from the Internet, the Secure Sockets Layer (SSL) will be enabled.
You will enter https:// and type your firewall WAN IP address into your browser, followed by a
colon (:) and the custom port number. For example, if your WAN IP address is 134.177.0.123 and
you use port number 8080, type the following in your browser:
https://134.177.0.123:8080
The router’s remote login URL is https://IP_address:port_number or
https://FullyQualifiedDomainName:port_number.
If you do not use the SSL https://address, but rather use http://address, the FVX538 will
automatically attempt to redirect to the https://address.
To configure your firewall for Telnet Management:
1. Select Administration from the main menu and Remote Management from the submenu.
The Remote Management screen will display.
2. Check the Allow Telnet Management radio box.
3. Specify what external addresses will be allowed to access the firewall’s remote management
interface.
Note: The first time you remotely connect the FVX538 with a browser via SSL, you may
get a message regarding the SSL certificate. If you are using a Windows computer
with Internet Explorer 5.5 or higher, simply click Yes to accept the certificate.
Tip: If you are using a dynamic DNS service such as TZO, you can identify the IP
address of your FVX538 by running tracert from the Windows Run menu
option. For example, enter tracert your FVX538.mynetgear.net, and
the IP address that your ISP assigned to the FVX538 will display.
Note: For enhanced security, restrict access to as few external IP addresses as
practical.