User's Manual
Table Of Contents
- Reference Manual for the Model FWAG114 Cable/ DSL Wireless ProSafe Firewall
- Contents
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Chapter 4 Firewall Protection and Content Filtering
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Observe Performance, Placement, and Range Guidelines
- Implement Appropriate Wireless Security
- Understanding Wireless Settings
- Chapter 4 Firewall Protection and Content Filtering
- Firewall Protection and Content Filtering Overview
- Block Sites
- Using Rules to Block or Allow Specific Kinds of Traffic
- Services
- Using a Schedule to Block or Allow Specific Traffic
- Getting E-Mail Notifications of Event Logs and Alerts
- Viewing Logs of Web Access or Attempted Web Access
- Configuring E-Mail Alert and Web Access Log Notifications
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Contents ix
Uplink Switches, Crossover Cables, and MDI/MDIX Switching ............................ B-12
Cable Quality ......................................................................................................... B-13
Appendix C
Preparing Your Network
Preparing Your Computers for TCP/IP Networking ....................................................... C-1
Configuring Windows 95, 98, and Me for TCP/IP Networking ....................................... C-2
Install or Verify Windows Networking Components ................................................. C-2
Enabling DHCP to Automatically Configure TCP/IP Settings
C-4
Selecting Windows’ Internet Access Method .......................................................... C-6
Verifying TCP/IP Properties .................................................................................... C-6
Configuring Windows NT4, 2000 or XP for IP Networking ............................................ C-7
Install or Verify Windows Networking Components ................................................. C-7
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4 ............................... C-8
DHCP Configuration of TCP/IP in Windows XP ..................................................... C-8
DHCP Configuration of TCP/IP in Windows 2000 ................................................ C-10
DHCP Configuration of TCP/IP in Windows NT4 .................................................. C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4 .............................. C-15
Configuring the Macintosh for TCP/IP Networking ...................................................... C-16
MacOS 8.6 or 9.x .................................................................................................. C-16
MacOS X ............................................................................................................... C-16
Verifying TCP/IP Properties for Macintosh Computers ......................................... C-17
Verifying the Readiness of Your Internet Account ....................................................... C-18
Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? .............................................................. C-18
Obtaining ISP Configuration Information for Windows Computers ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers ..................... C-20
Restarting the Network ................................................................................................ C-21
Appendix D
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... D-1
Infrastructure Mode ................................................................................................. D-2
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ D-2
Network Name: Extended Service Set Identification (ESSID) ................................ D-2
Authentication and WEP Data Encryption ..................................................................... D-3
802.11 Authentication .............................................................................................. D-3