Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P b. Click Pre-Shared Key. In this example, enter this pre-shared key in this field: hr5xb84l6aa9r6 Figure 8-29: Connection Identity Pre-Shared Key 4. c. Enter hr5xb84l6aa9r6, which is the same Pre-Shared Key entered in the FWG114P. d. Click OK. Configure the Connection Identity Settings. a. In the Network Security Policy list, click the Security Policy subheading. Figure 8-30: Security Policy b.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 5. Configure the Connection Security Policy In this step, you will provide the authentication (IKE Phase 1) settings, and the key exchange (Phase 2) settings. The setting choices in this procedure follow the VPNC guidelines. Figure 8-31: Connection Security Policy Authentication (Phase 1) a. Configure the Authentication (Phase 1) Settings.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure 8-32: Connection Security Policy Key Exchange (Phase 2) b. Configure the Key Exchange (Phase 2). • Expand the Key Exchange (Phase 2) heading, and click on Proposal 1. • For this example, ensure that the following settings are configured: – In the SA Life menu, select Unspecified. – In the Compression menu, select None. – Check the Encapsulation Protocol (ESP) check box.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 6. Configure the Global Policy Settings. a. From the Options menu at the top of the Security Policy Editor window, select Global Policy Settings. Figure 8-33: Security Policy Editor Global Policy Options 7. b. Increase the Retransmit Interval period to 45 seconds. c. Select the Allow to Specify Internal Network Address check box and click OK. Save the VPN Client Settings.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Testing the VPN Connection You can test the VPN connection in several ways: • From the client PC to the FWG114P • From the FWG114P to the client PC These procedures are explained below. Note: Virus protection or firewall software can interfere with VPN communications.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P To test the connection to a computer connected to the FWG114P, simply ping the IP address of that computer. Once connected, you can open a browser on the remote PC and enter the LAN IP Address of the FWG114P, which is http://192.168.0.1 in this example. After a short wait, you should see the login screen of the FWG114P.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P A sample Connection Monitor screen for a different connection is shown below: Figure 8-35: Connection Monitor screen In this example the following connection options apply: • • • The FWG114P has a public IP WAN address of 66.120.188.153 The FWG114P has a LAN IP address of 192.168.0.1 The VPN client PC is behind a home NAT router and has a dynamically assigned address of 192.168.0.
Reference Manual for the ProSafe Wireless 802.
Chapter 9 Maintenance This chapter describes how to use the maintenance features of your ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P. These features are accessed via the Main Menu Maintenance heading. Viewing Wireless Firewall/Print Server Status Information The Router Status menu provides status and usage information. From the main menu of the browser interface, click on Maintenance, then select Router Status to view this screen.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The Router Status screen shows the following parameters: Table 9-1. Status Fields Field Description System Name The System Name assigned to the router. Firmware Version The router firmware version. Printer Status The printer status. WAN Port These parameters apply to the Internet (WAN) port of the router. MAC Address This field displays the MAC address being used by the Internet (WAN) port of the router.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Table 9-1. Status Fields Field Description Broadcast Name Identifies if the Name (SSID) is being broadcast. Serial Port Status The status of the serial port. Click the Details button to view the Serial Port Log, Port Status, Physical Link, PPP Link, PPP IP Address, Phone Line Speed, and Serial Line Speed. Modem The status of the modem port. Dial-In The status of the Dial-In port.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Table 9-1. Connection Status Fields (continued) Field Description Network Mask The WAN (Internet) Subnet Mask assigned to the router. Default Gateway The WAN (Internet) default gateway the router communicates with. Log action buttons are described in Table 9-2. Table 9-2. Connection Status action buttons Field Description Renew Click the Renew button to renew the DHCP lease.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Table 9-1. Router Statistics Fields (continued) Field Description Collisions The number of collisions on this interface since reset or manual clear. Tx B/s The current transmission (outbound) bandwidth used on the interfaces. Rx B/s The current reception (inbound) bandwidth used on the interfaces. Up Time The amount of time since the router was last restarted.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P For each device, the table shows the IP address, Device Name (if available), and Ethernet MAC address. Note that if the router is rebooted, the table data is lost until the router rediscovers the devices. To force the router to look for attached devices, click the Refresh button.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P From the Main Menu of the browser interface, under the Maintenance heading, select the Settings Backup heading to bring up the menu shown below. Figure 9-5: Settings Backup menu Three options are available, and are described in the following sections.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Erasing the Configuration It is sometimes desirable to restore the router to a known blank condition. This can be done by using the Erase function, which will restore all factory settings. After an erase, the router's password will be password, the LAN IP address will be 192.168.0.1, and the router's DHCP client will be enabled. To erase the configuration, click the Erase button.
Chapter 10 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P. These features can be found under the Advanced heading in the Main Menu of the browser interface. Using the WAN Setup Options The first feature category under the Advanced heading is WAN Setup. This menu allows configuration of a DMZ server, MTU size, port speed, and so on.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Normally, this option is Enabled, so that an Internet connection will be made automatically whenever Internet-bound traffic is detected. In locations where Internet access is billed by the minute, if this causes high connection costs, you can disable this setting. If disabled, you must connect manually, using the sub-screen accessed from the Router Status menu “Show WAN Status” screen.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • Setting the MTU Size The default MTU size is usually fine. The normal MTU (Maximum Transmit Unit) value for most Ethernet networks is 1500 Bytes. For some ISPs, particularly those using PPPoE, you may need to reduce the MTU. This should not be done unless you are sure it is necessary for your ISP.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 3. Access the website of one of the dynamic DNS service providers whose names appear in the ‘Select Service Provider’ box, and register for an account. For example, for dyndns.org, go to www.dyndns.org. 4. Select the “Use a dynamic DNS service” check box. 5. Select the name of your dynamic DNS Service Provider. 6. Type the host name that your dynamic DNS service provider gave you.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Using the LAN IP Setup Options The second feature category under the Advanced heading is LAN IP Setup. This menu allows configuration of LAN IP services, such as DHCP and RIP. From the Main Menu of the browser interface, under Advanced, click on LAN IP Setup to view the LAN IP Setup menu, shown below.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P These addresses are part of the IETF-designated private address range for use in private networks, and should be suitable in most applications. If your network has a requirement to use a different IP addressing scheme, you can make those changes in this menu. The LAN IP parameters are: • IP Address This is the LAN IP address of the router. • IP Subnet Mask This is the LAN Subnet Mask of the router.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Using the Router as a DHCP server By default, the router will function as a DHCP (Dynamic Host Configuration Protocol) server, allowing it to assign IP, DNS server, and default gateway addresses to all computers connected to the router's LAN. The assigned default gateway address is the LAN address of the router. IP addresses will be assigned to the attached PCs from a pool of addresses specified in this menu.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 2. In the IP Address box, type the IP address to assign to the computer or server. (choose an IP address from the router’s LAN subnet, such as 192.168.0.X) 3. Type the MAC Address of the computer or server. (Tip: If the computer is already present on your network, you can copy its MAC address from the Attached Devices menu and paste it here.) 4. Click Apply to enter the reserved address into the table.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure 10-3. Static Route Entry and Edit Menu 2. Type a route name for this static route in the Route Name box. (This is for identification purpose only.) 3. Select Active to make this route effective. 4. Select Private if you want to limit access to the LAN only. The static route will not be reported in RIP. 5. Type the Destination IP Address of the final destination. 6.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • Your company’s network is 134.177.0.0. When you first configured your router, two implicit static routes were created. A default route was created with your ISP as the gateway, and a second static route was created to your local network for all 192.168.0.x addresses. With this configuration, if you attempt to access a device on the 134.177.0.0 network, your router will forward your request to the ISP.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 3. b. To allow access from a range of IP addresses on the Internet, select IP address range. Enter a beginning and ending IP address to define the allowed range. c. To allow access from a single IP address on the Internet, select Only this computer. Enter the IP address that will be allowed access. Specify the Port Number that will be used for accessing the management interface.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Turn UPnP On: UPnP can be enabled or disabled for automatic device configuration. The default setting for UPnP is enabled. If disabled, the router will not allow any device to automatically control the resources, such as port forwarding (mapping), of the router. Advertisement Period: The Advertisement Period is how often the router will broadcast its UPnP information. This value can range from 1 to 1440 minutes.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • Beacon Interval Specifies the data beacon rate between 20 and 1000. • DTIM The Delivery Traffic Indication Message. Specifies the data beacon rate between 1 and 255. • Preamble Type A long transmit preamble may provide a more reliable connection or slightly longer range. A short transmit preamble gives better performance.
Reference Manual for the ProSafe Wireless 802.
Chapter 11 Troubleshooting This chapter gives information about troubleshooting your ProSafe Wireless 802.11g Firewall/ Print Server Model FWG114P. After each problem description, instructions are provided to help you diagnose and solve the problem. Basic Functioning After you turn on power to the router, the following sequence of events should occur: 1. When power is first applied, verify that the PWR LED is on. 2. After approximately 10 seconds, verify that: a. The TEST LED is not lit. b.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P LEDs Never Turn Off When the router is turned on, the LEDs turns on for about 10 seconds and then turns off. If all the LEDs stay on, there is a fault within the router. If all LEDs are still on one minute after power up: • Cycle the power to see if the router recovers. • Clear the router’s configuration to the factory defaults. This will set the router’s IP address to 192.168.0.1.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Troubleshooting the Web Configuration Interface If you are unable to access the router’s Web Configuration interface from a computer on your local network, check the following: • Check the Ethernet connection between the computer and the router as described in the previous section. • Make sure your computer’s IP address is on the same subnet as the router.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Troubleshooting the ISP Connection If your router is unable to access the Internet, you should first determine whether the router is able to obtain a WAN IP address from the ISP. Unless you have been assigned a static IP address, your router must request an IP address from the ISP. You can determine whether the request was successful using the Web Configuration Manager. To check the WAN IP address: 1.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P OR Configure your router to spoof your computer’s MAC address. This can be done in the Basic Settings menu. Refer to “Manually Configuring Your Internet Connection” on page 3-17. If your router can obtain an IP address, but your computer is unable to load any Web pages from the Internet: • Your computer may not recognize any DNS server addresses.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Pinging with 32 bytes of data If the path is working, you see this message: Reply from < IP address >: bytes=32 time=NN ms TTL=xxx If the path is not working, you see this message: Request timed out If the path is not functioning correctly, you could have one of the following problems: • Wrong physical connections — Make sure the LAN port LED is on.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P — If your ISP assigned a host name to your computer, enter that host name as the Account Name in the Basic Settings menu. — Your ISP could be rejecting the Ethernet MAC addresses of all but one of your PCs. Many broadband ISPs restrict access by only allowing traffic from the MAC address of your broadband modem, but some ISPs additionally restrict access to the MAC address of a single computer connected to that modem.
Reference Manual for the ProSafe Wireless 802.
Appendix A Technical Specifications This appendix provides technical specifications for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Electromagnetic Emissions For North America and Australia FCC Part 15 Class B For Japan VCCI Class B For Europe EN 300 328, EN 301 489-17, EN 301 489-1, EN 60950 Interface Specifications LAN: 10BASE-T or 100BASE-Tx, RJ-45 WAN: 10BASE-T or 100BASE-Tx Printer: USB v1.1 Serial: RS-232 male DB-9 connector Wireless Data Encoding: 802.11b: Direct Sequence Spread Spectrum (DSSS) 802.
Appendix B Networks, Routing, and Firewall Basics This appendix provides an overview of IP networks, routing, and firewalls. Related Publications As you read this document, you may be directed to various RFC documents for further information. An RFC is a Request For Comment (RFC) published by the Internet Engineering Task Force (IETF), an open organization that defines the architecture and operation of the Internet.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Routing Information Protocol One of the protocols used by a router to build and maintain a picture of the network is the Routing Information Protocol (RIP). Using RIP, routers periodically update one another and check for changes to add to the routing table. The FWG114P Wireless Firewall/Print Server supports both the older RIP-1 and the newer RIP-2 protocols.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Class A Network Node Class B Network Node Class C Network Node Figure 11-1: Three Main Address Classes The five address classes are: • Class A Class A addresses can have up to 16,777,214 hosts on a single network. They use an eight-bit network number and a 24-bit node number. Class A addresses are in this range: 1.x.x.x to 126.x.x.x. • Class B Class B addresses can have up to 65,354 hosts on a network.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P This addressing structure allows IP addresses to uniquely identify each physical network and each node on each physical network. For each unique value of the network portion of the address, the base address of the range (host address of all zeros) is known as the network address and is not usually assigned to a host.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Subnet addressing allows us to split one IP network address into smaller multiple physical networks known as subnetworks. Some of the node numbers are used as a subnet number instead. A Class B address gives us 16 bits of node numbers translating to 64,000 nodes. Most organizations do not use 64,000 nodes, so there are free bits that can be reassigned.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The following table lists the additional subnet mask bits in dotted-decimal notation. To use the table, write down the original class netmask and replace the 0 value octets with the dotted-decimal value of the additional subnet bits. For example, to partition your Class C network with subnet mask 255.255.255.0 into 16 subnets (4 bits), the new subnet mask becomes 255.255.255.240. Table 11-1.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P NETGEAR strongly recommends that you configure all hosts on a LAN segment to use the same netmask for the following reasons: • So that hosts recognize local IP broadcast packets. When a device broadcasts to its segment neighbors, it uses a destination address of the local network address with all ones for the host address.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The router accomplishes this address sharing by translating the internal LAN IP addresses to a single address that is globally unique on the Internet. The internal LAN IP addresses can be either private addresses or registered addresses. For more information about IP address translation, refer to RFC 1631, The IP Network Address Translator (NAT). The following figure illustrates a single IP address operation.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P MAC Addresses and Address Resolution Protocol An IP address alone cannot be used to deliver data from one LAN device to another. To send data between LAN devices, you must convert the IP address of the destination device to its media access control (MAC) address. Each device on an Ethernet network has a unique MAC address, which is a 48-bit number assigned to each device by the manufacturer.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P When a PC accesses a resource by its descriptive name, it first contacts a DNS server to obtain the IP address of the resource. The PC sends the desired message using the IP address. Many large organizations, such as ISPs, maintain their own DNS servers and allow their customers to use the servers to look up addresses.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P What is a Firewall? A firewall is a device that protects one network from another, while allowing communication between the two. A firewall incorporates the functions of the NAT router, while adding features for dealing with a hacker intrusion or attack. Several known types of intrusion or attack can be recognized when they occur.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P . Table B-1. UTP Ethernet cable wiring, straight-through Pin Wire color Signal 1 Orange/White Transmit (Tx) + 2 Orange Transmit (Tx) - 3 Green/White Receive (Rx) + 4 Blue 5 Blue/White 6 Green 7 Brown/White 8 Brown Receive (Rx) - Category 5 Cable Quality Category 5 distributed cable that meets ANSI/EIA/TIA-568-A building wiring standards can be a maximum of 328 feet (ft.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Inside Twisted Pair Cables For two devices to communicate, the transmitter of each device must be connected to the receiver of the other device. The crossover function is usually implemented internally as part of the circuitry in the device. Computers and workstation adapter cards are usually media-dependent interface ports, called MDI or uplink ports.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure B-3: Category 5 UTP Cable with Male RJ-45 Plug at Each End Note: Flat “silver satin” telephone cable may have the same RJ-45 plug. However, using telephone cable results in excessive collisions, causing the attached port to be partitioned or disconnected from the network.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The FWG114P Wireless Firewall/Print Server incorporates Auto UplinkTM technology (also called MDI/MDIX). Each LOCAL Ethernet port will automatically sense whether the Ethernet cable plugged into the port should have a normal connection (e.g. connecting to a PC) or an uplink connection (e.g. connecting to a router, switch, or hub). That port will then configure itself to the correct configuration.
Reference Manual for the ProSafe Wireless 802.
Appendix C Preparing Your Network This appendix describes how to prepare your network to connect to the Internet through the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P and how to verify the readiness of broadband Internet service from an Internet service provider (ISP).
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P In your IP network, each PC and the firewall must be assigned unique IP addresses. Each PC must also have certain other IP configuration information, such as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address. In most cases, you should install TCP/ IP so that the PC obtains its specific network configuration information automatically from a DHCP server during bootup.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P You must have an Ethernet adapter, the TCP/IP protocol, and Client for Microsoft Networks. Note: It is not necessary to remove any other network components shown in the Network window in order to install the adapter, TCP/IP, or Client for Microsoft Networks. If you need to install a new adapter, follow these steps: a. Click the Add button. b. Select Adapter, and then click Add. c.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P If you need Client for Microsoft Networks: 3. a. Click the Add button. b. Select Client, and then click Add. c. Select Microsoft. d. Select Client for Microsoft Networks, and then click OK. Restart your PC for the changes to take effect.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 5. Uncheck all boxes in the LAN Internet Configuration screen and click Next. 6. Proceed to the end of the Wizard. Verifying TCP/IP Properties After your PC is configured and has rebooted, you can check the TCP/IP configuration using the utility winipcfg.exe: 1. On the Windows taskbar, click the Start button, and then click Run. 2. Type winipcfg, and then click OK.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 5. Verify that ‘Client for Microsoft Networks’ and ‘Internet Protocol (TCP/IP)’ are present. If not, select Install and add them. 6. Select ‘Internet Protocol (TCP/IP)’, click Properties, and verify that “Obtain an IP address automatically is selected. 7. Click OK and close all Network and Dialup Connections windows. 8. Make sure your PC is connected to the firewall, then reboot your PC.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The TCP/IP Control Panel opens: 2. From the “Connect via” box, select your Macintosh’s Ethernet interface. 3. From the “Configure” box, select Using DHCP Server. You can leave the DHCP Client ID box empty. 4. Close the TCP/IP Control Panel. 5. Repeat this for each Macintosh on your network. MacOS X 1. From the Apple menu, choose System Preferences, then Network. 2.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Verifying TCP/IP Properties for Macintosh Computers After your Macintosh is configured and has rebooted, you can check the TCP/IP configuration by returning to the TCP/IP Control Panel. From the Apple menu, select Control Panels, then TCP/IP.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Verifying the Readiness of Your Internet Account For broadband access to the Internet, you need to contract with an Internet service provider (ISP) for a single-user Internet access account using a cable modem or DSL modem. This modem must be a separate physical box (not a card) and must provide an Ethernet port intended for connection to a Network Interface Card (NIC) in a computer.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • An IP address and subnet mask • A gateway IP address, which is the address of the ISP’s router • One or more domain name server (DNS) IP addresses • Host name and domain suffix For example, your account’s full server names may look like this: mail.xxx.yyy.com In this example, the domain suffix is xxx.yyy.com. If any of these items are dynamically supplied by the ISP, your firewall automatically acquires them.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P If an IP address appears under Installed Gateways, write down the address. This is the ISP’s gateway address. Select the address and then click Remove to remove the gateway address. 6. Select the DNS Configuration tab. If any DNS server addresses are shown, write down the addresses. If any information appears in the Host or Domain information box, write it down. Click Disable DNS. 7.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Restarting the Network Once you have set up your computers to work with the firewall, you must reset the network for the devices to be able to communicate correctly. Restart any computer that is connected to the firewall.
Appendix D Firewall Log Formats Action List Drop: Reset: Forward: Receive: Packet dropped by Firewall current inbound or outbound rules. TCP session reset by Firewall. Packet forwarded by Firewall to the next hop based on matching the criteria in the rules table. Packet was permitted by the firewall rules and modified prior to being forwarded and/or replied to.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The format is:
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The format is:
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Other Connections and Traffic to this Router The format is: < PKT_TYPE > [Fri, 2003-12-05 22:31:27] - ICMP Packet[Echo Request] - Source: 192.168.0.10 Destination: 192.168.0.1 - [Receive] [Wed, 2003-07-30 16:34:56] - ICMP Packet[Type: 238] - Source: 64.3.3.201 Destination: 192.168.0.3 - [Drop] [Fri, 2003-12-05 22:59:56] - ICMP Packet[Echo Request] - Source:192.168.0.10 Destination:192.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The format is: < SRC_IP>< DST_IP> [Fri, 2003-12-05 21:22:07] - TCP Packet - Source:172.31.12.156,54611 ,WAN Destination:172.31.12.157,134 ,LAN [Drop] - [FIN Scan] [Fri, 2003-12-05 21:22:38] - TCP Packet - Source:172.31.12.156,59937 ,WAN Destination:172.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Access Block Site If keyword blocking is enabled and a keyword is specified, attempts to access a site whose URL contains a specified keyword are logged. The format is [Fri, 2003-12-05 23:01:47] - Attempt to access blocked sites Source:192.168.0.10,LAN - Destination:www.google.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The format is: [Fri, 2003-12-05 21:07:43] - Administrator login successful - IP:192.168.0.10 [Fri, 2003-12-05 21:09:16] - Administrator logout - IP:192.168.0.10 [Fri, 2003-12-05 21:09:31] - Administrator login fail, Username error IP:192.168.0.10 [Fri, 2003-12-05 21:09:25] - Administrator login fail, Password error IP:192.168.0.
Reference Manual for the ProSafe Wireless 802.
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P Wireless Firewall/Print Server conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.11b and 802.11g standards for wireless LANs (WLANs). On an 802.11b or g wireless link, data is encoded using direct-sequence spread-spectrum (DSSS) technology and is transmitted in the unlicensed radio spectrum at 2.5GHz. The maximum data rate for the 802.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Ad Hoc Mode (Peer-to-Peer Workgroup) In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed points to the network - each node can generally communicate with any other node. There is no Access Point involved in this configuration.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • Shared Key. With Shared Key authentication, only those PCs that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network. Wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured to operate in Shared Key authentication mode. 802.11 Authentication The 802.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 2. The access point authenticates the station. 3. The station associates with the access point and joins the network. This process is illustrated below. 2SHQ 6\VWHP $XWKHQWLFDWLRQ 6WHSV !UTHENTICATION REQUEST SENT TO !0 $FFHVV 3RLQW $3 !0 AUTHENTICATES ).4%2.%4 ?MjÊ . +Á.?wjË8ÁjjÄÄË7+!Ë.jWÖÁÍßË ÁjÝ? 072 7,!. $&7 7 Ϥo (QDEOH /1.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 6KDUHG .H\ $XWKHQWLFDWLRQ 6WHSV !UTHENTICATION REQUEST SENT TO !0 $FFHVV 3RLQW !0 SENDS CHALLENGE TEXT ).4%2.%4 ?MjÊ . +Á.?wjË8ÁjjÄÄË7+!Ë.jWÖÁÍßË ÁjÝ? 072 7,!. -/$%, ,/#!, /1. 7 Ϥo 4%34 $&7 (QDEOH /1.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Key Size The IEEE 802.11 standard supports two types of WEP encryption: 40-bit and 128-bit. The 64-bit WEP data encryption method allows for a five-character (40-bit) input. Additionally, 24 factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. The 24 factory-set bits are not user-configurable).
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P WEP Configuration Options The WEP settings must match on all 802.11 devices that are within the same wireless network as identified by the SSID. In general, if your mobile clients will roam between access points, then all of the 802.11 access points and all of the 802.11 client adapters on the network must have the same WEP settings.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Table E-2: Channel 802.11b/g Radio Frequency Channels Center Frequency Frequency Spread 4 2427 MHz 2414.5 MHz - 2439.5 MHz 5 2432 MHz 2419.5 MHz - 2444.5 MHz 6 2437 MHz 2424.5 MHz - 2449.5 MHz 7 2442 MHz 2429.5 MHz - 2454.5 MHz 8 2447 MHz 2434.5 MHz - 2459.5 MHz 9 2452 MHz 2439.5 MHz - 2464.5 MHz 10 2457 MHz 2444.5 MHz - 2469.5 MHz 11 2462 MHz 2449.5 MHz - 2474.5 MHz 12 2467 MHz 2454.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P WPA offers the following benefits: • • • • Enhanced data privacy Robust key management Data origin authentication Data integrity protection The Wi-Fi Alliance is now performing interoperability certification testing on Wi-Fi Protected Access products. Starting August of 2003, all new Wi-Fi certified products will have to support WPA.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P How Does WPA Compare to IEEE 802.11i? WPA will be forward compatible with the IEEE 802.11i security specification currently under development. WPA is a subset of the current 802.11i draft and uses certain pieces of the 802.11i draft that are ready to bring to market today, such as 802.1x and TKIP. The main pieces of the 802.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The primary information conveyed in the Beacon frames is the authentication method and the cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared key is an authentication method that uses a statically configured pass phrase on both the stations and the access point.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Wired Network with Optional 802.1x Port Based Network Access Control Wireless LAN WPA enabled wireless client with “supplicant” WPA enabled Access Point using pre-shared key or 802.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Client with a WPAenabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse) For example, a RADIUS server For example, a WPA-enabled AP 1 2 3 4 6 5 7 Figure E-4: 802.1x Authentication Sequence The AP sends Beacon Frames with WPA information element to the stations in the service set. Information elements include the required authentication method (802.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 3. The client sends an EAP-response packet containing the identity to the authentication server. The access point responds by enabling a port for passing only EAP packets from the client to an authentication server located on the wired side of the access point.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to provide important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the following: • • • The verification of the security configuration after the encryption keys are determined.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Is WPA Perfect? WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the message integrity code (MIC) within 60 seconds of each other, then the network is under an active attack, and as a result, the access point employs counter measures, which include disassociating each station using the access point.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Changes to Wireless Access Points Wireless access points must have their firmware updated to support the following: • • • • • The new WPA information element To advertise their support of WPA, wireless APs send the beacon frame with a new 802.11 WPA information element that contains the wireless AP's security configuration (encryption algorithms and wireless security configuration information).
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Microsoft has worked with many wireless vendors to embed the WPA firmware update in the wireless adapter driver. So, to update your Microsoft Windows wireless client, all you have to do is obtain the new WPA-compatible driver and install the driver. The firmware is automatically updated when the wireless network adapter driver is loaded in Windows.
Appendix F Virtual Private Networking There have been many improvements in the Internet, including Quality of Service, network performance, and inexpensive technologies, such as DSL. But one of the most important advances has been in Virtual Private Networking (VPN) Internet Protocol security (IPSec). IPSec is one of the most complete, secure, and commercially available, standards-based protocols developed for transporting data.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • Remote Access: Remote access enables telecommuters and mobile workers to access e-mail and business applications. A dial-up connection to an organization’s modem pool is one method of access for remote workers, but is expensive because the organization must pay the associated long distance telephone and service costs.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • Encapsulating Security Payload (ESP): Provides confidentiality, authentication, and integrity. • Authentication Header (AH): Provides authentication and integrity. • Internet Key Exchange (IKE): Provides key management and Security Association (SA) management.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P The ESP header is inserted into the packet between the IP header and any subsequent packet contents. However, because ESP encrypts the data, the payload is changed. ESP does not encrypt the ESP header, nor does it encrypt the ESP authentication. Authentication Header (AH) AH provides authentication and integrity, which protect against data tampering, using the same algorithms as ESP.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Mode SAs operate using modes. A mode is the method in which the IPSec protocol is applied to the packet. IPSec can be used in tunnel mode or transport mode. Typically, the tunnel mode is used for gateway-to-gateway IPSec tunnel protection, while transport mode is used for host-to-host IPSec tunnel protection.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Key Management IPSec uses the Internet Key Exchange (IKE) protocol to facilitate and automate the SA setup and the exchange of keys between parties transferring data. Using keys ensures that only the sender and receiver of a message can access it. IPSec requires that keys be re-created, or refreshed, frequently, so that the parties can communicate securely with each other.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P VPN Process Overview Even though IPSec is standards-based, each vendor has its own set of terms and procedures for implementing the standard. Because of these differences, it may be a good idea to review some of the terms and the generic processes for connecting two gateways before diving into the specifics.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Table 5-3. WAN (Internet/Public) and LAN (Internal/Private) Addressing Gateway LAN or WAN VPNC Example Address Gateway A LAN (Private) 10.5.6.1 Gateway A WAN (Public) 14.15.16.17 Gateway B LAN (Private) 22.23.24.25 Gateway B WAN (Public) 172.23.9.1 It will also be important to know the subnet mask of both gateway LAN Connections. Table 5-4.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P A B Figure F-5: VPN Tunnel SA The SA contains all the information necessary for gateway A to negotiate a secure and encrypted communication stream with gateway B. This communication is often referred to as a “tunnel.” The gateways contain this information so that it does not have to be loaded onto every computer connected to the gateways.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 2. IKE Phase I. a. The two parties negotiate the encryption and authentication algorithms to use in the IKE SAs. b. The two parties authenticate each other using a predetermined mechanism, such as preshared keys or digital certificates. c. A shared master key is generated by the Diffie-Hellman Public key algorithm within the IKE framework for the two parties.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P VPNC IKE Phase II Parameters The IKE Phase 2 parameters used in Scenario 1 are: • • • • • • TripleDES SHA-1 ESP tunnel mode MODP group 1 Perfect forward secrecy for rekeying SA lifetime of 28800 seconds (one hour) Testing and Troubleshooting Once you have completed the VPN configuration steps you can use PCs, located behind each of the gateways, to ping various addresses on the LAN side of the other gateway.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P • [RFC 791] Internet Protocol DARPA Internet Program Protocol Specification, Information Sciences Institute, USC, September 1981. • [RFC 1058] Routing Information Protocol, C Hedrick, Rutgers University, June 1988. • [RFC 1483] Multiprotocol Encapsulation over ATM Adaptation Layer 5, Juha Heinanen, Telecom Finland, July 1993. • [RFC 2401] S. Kent, R.
Appendix G NETGEAR VPN Configuration FVS318 or FVM318 to FWG114P This appendix provides a case study on how to configure a secure IPSec VPN tunnel between a NETGEAR FVS318 or FVM318 to a FWG114P. The configuration options and screens for the FVS318 and FVM318 are the same. Configuration Template The configuration in this document follows the addressing and configuration mechanics defined by the VPN Consortium. Gather all the necessary information before you begin the configuration process.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 10.5.6.0/24 Gateway B Gateway A LAN IP 10.5.6.1 172.23.9.0/24 VPNC Example Network Interface Addressing 14.15.16.17 22.23.24.25 WAN IP WAN IP LAN IP 172.23.9.1 Figure G-1: Addressing and Subnet Used for Examples Step-By-Step Configuration of FVS318 or FVM318 Gateway A 1. Log in to the FVS318 or FVM318 labeled Gateway A as in the illustration.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 2. Click the VPN Settings link on the left side of the Settings management GUI. Click the radio button of the first available VPN leg (all 8 links are available in the example). Click the Edit button below. This will take you to the VPN Settings – Main Mode Menu.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P – – – – – Choose a subnet from local address from the “Tunnel can access” pull-down menu. Type the starting LAN IP Address of Gateway B (172.23.9.1 in our example) in the Local IP Remote LAN Start IP Address field. Type the finishing LAN IP Address of Gateway B (0.0.0.0 in our example) in the Local IP Remote LAN Finish IP Address field. Type the LAN Subnet Mask of Gateway B (255.255.255.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Step-By-Step Configuration of FWG114P Gateway B 1. Log in to the NETGEAR FVS328 labeled Gateway B as in the illustration. Out of the box, the FVS328 is set for its default LAN address of http://192.168.0.1, with its default user name of admin and default password of password. For this example we will assume you have set the local LAN address as 172.23.9.1 for Gateway B and have set your own user name and password. 2.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure G-6: NETGEAR FVS328 IKE Policy Configuration – Part 2 – – – – – – 3. From the Encryption Algorithm drop-down box, select 3DES. From the Authentication Algorithm drop-down box, select MD5. From the Authentication Method radio button, select Pre-shared Key. In the Pre-Shared Key field, type hr5xb84l6aa9r6. You must make sure the key is the same for both gateways.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure G-8: NETGEAR FVS328 VPN – Auto Policy (part 1) – – – – – – – – – – – Enter a unique name to identify this policy. This name is not supplied to the remote VPN endpoint. In our example we have used to318 as the Policy Name. In the Policy Name field type to318. From the IKE policy drop-down box, select the IKE Policy that was set up in the earlier step – this being the FVS318 IKE Policy.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P – Type the LAN Subnet Mask of Gateway B (255.255.255.0 in our example) in the Local IP Subnet Mask field. Figure G-9: NETGEAR FWG114P VPN – Auto Policy (part 2) 5. G-8 – From the Traffic Selector Remote IP drop-down box, select Subnet address. – Type the starting LAN IP Address of Gateway A (10.5.6.1 in our example) in the Remote IP Start IP Address field. – Type the finishing LAN IP Address of Gateway A (0.0.0.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure G-10: NETGEAR FWG114P VPN Policies Menu (Post Configuration) 6. When the screen returns to the VPN Policies, make sure the Enable check box is selected. Click the Apply button. Test the VPN Connection 1. From a PC behind the NETGEAR FVS318 or FVM318 gateway A attempt to ping the remote FWG114P gateway B LAN Interface address (example address 172.23.9.1). 2.
Reference Manual for the ProSafe Wireless 802.
Appendix H NETGEAR VPN Configuration FVS318 or FVM318 with FQDN to FVS328 This appendix provides a case study on how to configure a VPN tunnel between a NETGEAR FVS318 or FVM318 to a FWG114P using a Fully Qualified Domain Name (FQDN) to resolve the public address of one or both routers. The configurations screens and settings for the FVS318 and FVM318 are the same. Configuration Template The configuration in this document follows the addressing and configuration mechanics defined by the VPN Consortium.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 10.5.6.0/24 172.23.9.0/24 VPNC Example Network Interface Addressing Gateway B Gateway A WAN IP LAN IP 10.5.6.1 FQDN netgear.dydns.org WAN IP 22.23.24.25 LAN IP 172.23.9.1 Figure H-1: Addressing and Subnet Used for Examples Using DDNS and Fully Qualified Domain Names (FQDN) Many ISPs (Internet Service Providers) provide connectivity to their customers using dynamic instead of static IP addressing.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P DynDNS service. Gateway B will use the DDNS Service Provider when establishing a VPN tunnel. In order to establish VPN connectivity Gateway A must be configured to use Dynamic DNS, and Gateway B must be configured to use a DNS hostname to find Gateway A provided by a DDNS Service Provider.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P 4. Select the Use a dynamic DNS service radio button for the service you are using. In this example we are using www.DynDNS.org as the service provider. – – – 5. Type the Host Name that your dynamic DNS service provider gave you. The dynamic DNS service provider may call this the domain name. In this example we are using dyndns.org as the domain suffix. Type the User Name for your dynamic DNS account.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure H-4: NETGEAR FVS318 VPN Settings (part 1) – Main Mode – – – – – – – – – In the Connection Name box, enter in a unique name for the VPN tunnel to be configured between the NETGEAR devices. For this example we have used toFVS328. Enter a Local IPSec Identifier name for the NETGEAR FVS318 Gateway A. This name must be entered in the other endpoint as Remote IPSec Identifier. In this example we used netgear.dyndns.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P – – – Type the finishing LAN IP Address of Gateway B (0.0.0.0 in our example) in the Local IP Remote LAN Finish IP Address field. Type the LAN Subnet Mask of Gateway B (255.255.255.0 in our example) in the Remote LAN IP Subnetmask field. Type the WAN IP address (22.23.24.25 in our example) of Gateway B in the Remote WAN IP or FQDN field.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Step-By-Step Configuration of FVS328 Gateway B 1. Log in to the NETGEAR FVS328, labeled Gateway B in the illustration. Out of the box, the FVS328 is set for its default LAN address of http://192.168.0.1, with its default user name of admin and default password of password. For this example we will assume you have set the local LAN address as 172.23.9.1 for Gateway B. 2.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure H-7: NETGEAR FVS328 IKE Policy Configuration – Part 2 – – – – – – 3. From the Encryption Algorithm drop-down box, select 3DES. From the Authentication Algorithm drop-down box, select MD5. From the Authentication Method radio button, select Pre-shared Key. In the Pre-Shared Key field, type hr5xb84l6aa9r6. You must make sure the key is the same for both gateways.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure H-9: NETGEAR FVS328 VPN – Auto Policy (part 1) – – – – – – – – – – – – Enter a unique name to identify this policy. This name is not supplied to the remote VPN endpoint. In our example we have used to318 as the Policy Name. In the Policy Name field type to318. From the IKE policy drop-down box, select the IKE Policy that was set up in the earlier step – the FVS318 IKE Policy.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure H-10: NETGEAR FVS328 VPN – Auto Policy (part 2) – – – – – – – – – – 5. From the Traffic Selector Remote IP drop-down box, select Subnet address. Type the starting LAN IP Address of Gateway A (10.5.6.1 in our example) in the Remote IP Start IP Address field. Type the finishing LAN IP Address of Gateway A (0.0.0.0 in our example) in the Remote IP Finish IP Address field. Type the LAN Subnet Mask of Gateway A (255.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Figure H-11: NETGEAR FVS328 VPN Policies Menu (Post Configuration) 6. When the screen returns to the VPN Policies, make sure the Enable check box is selected. Click the Apply button. Test the VPN Connection 1. From a PC behind the NETGEAR FVS318 or FVM318 Gateway A, attempt to ping the remote FWG114P Gateway B LAN Interface address (example address 172.23.9.1). 2.
Reference Manual for the ProSafe Wireless 802.
Glossary List of Glossary Terms Use the list below to find definitions for technical terms used in this manual. 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring. 100BASE-Tx IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring. 802.1x 802.1x defines port-based, network access control used to provide authenticated network access and automated data encryption key management. The IEEE 802.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P ADSL Short for asymmetric digital subscriber line, a technology that allows data to be sent over existing copper telephone lines at data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate). ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world gain access.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Certificate Authority A Certificate Authority is a trusted third-party organization or company that issues digital certificates used to create digital signatures and public-private key pairs. The role of the CA in this process is to guarantee that the individual granted the unique certificate is, in fact, who he or she claims to be.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Dynamic Host Configuration Protocol DHCP. An Ethernet protocol specifying how a centralized DHCP server can assign network configuration information to multiple DHCP clients. The assigned information includes IP addresses, DNS addresses, and gateway (router) addresses. EAP Extensible Authentication Protocol is a general protocol for authentication that supports multiple authentication methods.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P Internet Protocol The main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control Protocol (TCP) to form TCP/IP. LAN A communications network serving users within a limited area, such as one floor of a building. local area network LAN. A communications network serving users within a limited area, such as one floor of a building.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P netmask Combined with the IP address, the IP Subnet Mask allows a device to know which other addresses are local to it, and which must be reached through a gateway or router. A number that explains which part of an IP address comprises the network address and which part is the host address on that network. It can be expressed in dotted-decimal notation or as a number appended to the IP address.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P RADIUS Short for Remote Authentication Dial-In User Service, RADIUS is an authentication system. Using RADIUS, you must enter your user name and password before gaining access to a network. This information is passed to a RADIUS server, which checks that the information is correct, and then authorizes access. Though not an official standard, the RADIUS specification is maintained by a working group of the IETF.
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P WAN A long distance link used to extend or connect remotely located local area networks. The Internet is a large WAN. WEP Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks. All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for data encryption. wide area network WAN.
Index Numerics 802.
F factory settings, restoring 9-8 IP networking for Macintosh C-6 for Windows C-2, C-5 firewall features 2-3 IPSec F-1 Flash memory, for firmware upgrade 2-1 IPSec Components F-2 FQDN 2-3 IPSec SA negotiation F-9 front panel 2-7, 2-8 IPSec Security Features F-2 Fully Qualified Domain Name 2-3 ISP 3-1 G L gateway address C-11 LAN IP Setup Menu 10-5 General 8-4, 8-7, 8-11 LEDs description 2-7 troubleshooting 11-2 H host name 3-10, 3-12, 3-18 I IANA contacting B-2 IETF B-1 Web site address B
Network Address Translation 2-5, B-7, C-9 reserved IP adresses 10-7 Network Time Protocol 6-13, 11-7 restore configuration 9-6 newsgroup 6-3 restore factory settings 9-8 NTP 6-13, 11-7 Restrict Wireless Access by MAC Address 4-10 O Open System authentication E-2 outbound rules 6-9 RFC 1466 B-7, B-9 1597 B-7, B-9 1631 B-8, B-9 finding B-7 RIP (Router Information Protocol) 10-6 P router concepts B-1 package contents 2-6 Router Status 9-1 Passphrase 4-5, 4-11 Routing Information Protocol 2-4, B-
subnet addressing B-4 winipcfg utility C-5 subnet mask B-5, C-10, C-11 WinPOET C-9 Wired Equivalent Privacy.