Specifications

Network Planning for Multiple WAN Ports
415
ProSAFE Gigabit Quad WAN SSL VPN Firewall SRX5308
Figure 262.
b. Contact a Dynamic DNS service, and register FQDNs for one or both WAN ports.
3. Plan your network management approach.
The VPN firewall can be managed remotely, but you need to enable remote
management locally after each factory default reset.
NETGEAR strongly advises you to change the default management password to a
strong password before enabling remote management.
if the factory default settings are not suitable for your installation, you can choose
various WAN options. These options include enabling a WAN port to respond to a
ping, and setting MTU size, port speed, and upload bandwidth.
4. Prepare to physically connect the firewall to your cable or DSL modems and a computer.
Instructions for connecting the VPN firewall are in the ProSafe Gigabit Quad WAN SSL VPN
Firewall SRX5308 Installation Guide.
Cabling and Computer Hardware Requirements
For you to use the VPN firewall in your network, each computer needs to have an Ethernet
network interface card (NIC) installed and needs to be equipped with an Ethernet cable. If the
computer connects to your network at 100 Mbps or higher speeds, you need to use a
Category 5 (Cat 5) cable.
Computer Network Configuration Requirements
The VPN firewall integrates a web management interface. To access the configuration
screens on the VPN firewall, you need to use a Java-enabled web browser that supports
HTTP uploads, such as Microsoft Internet Explorer 6 or later, Mozilla Firefox 3 or later, or
Apple Safari 3 or later with JavaScript, cookies, and SSL enabled. Free browsers are readily
available for Windows, Macintosh, and UNIX/Linux.
For the initial connection to the Internet and configuration of the VPN firewall, you need to
connect a computer to the VPN firewall, and the computer needs to be configured to
automatically get its
TCP/IP configuration from the VPN firewall through DHCP
.
The DSL broadband access device needs to provide a standard Ethernet interface.
ISP 1
ISP 2
Internet
WAN port 1
WAN port 2
Customer premises
Physical facility 1
Physical facility 2
Route diversity
VPN
Firewall