ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual - Netgear

Transcription

ProSafe Wireless-N VPNFirewall SRXN3205Reference ManualNETGEAR, Inc.350 East Plumeria DriveSan Jose, CA 95134202-10416-02v1.0January 2010

2008–2010 by NETGEAR, Inc. All rights reserved.Technical SupportPlease refer to the support information card that shipped with your product. By registering your product athttp://www.netgear.com/register, we can provide you with faster expert technical support and timely notices ofproduct and software upgrades.NETGEAR, INC. Support InformationPhone: 1-888-NETGEAR, for US & Canada only. For other countries, see your Support information card.E-mail: support@netgear.comNorth American NETGEAR website: http://www.netgear.comTrademarksNETGEAR and the NETGEAR logo are registered trademarks and ProSafe is a trademark of NETGEAR, Inc.Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other brand and productnames are registered trademarks or trademarks of their respective holders.Statement of ConditionsIn the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right tomake changes to the products described in this document without notice.NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuitlayout(s) described herein.Federal Communications Commission (FCC) Compliance Notice: Radio FrequencyNoticeThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant topart 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in aresidential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed andused in accordance with the instructions, may cause harmful interference to radio communications. However, there is noguarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference toradio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to tryto correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.EU Regulatory Compliance StatementThe ProSafe Wireless-N VPN Firewall is compliant with the following EU Council Directives: 89/336/EEC and LVD73/23/EEC. Compliance is verified by testing to the following standards: EN55022 Class B, EN55024 and EN60950-1.For EU Declaration of Conformity please visit: http://kb.netgear.com/app/answers/detail/a id/11621/sno/0.iiv1.0, January 2010

Bestätigung des Herstellers/ImporteursEs wird hiermit bestätigt, daß das ProSafe Wireless-N VPN Firewall gemäß der im BMPT-AmtsblVfg 243/1991 und Vfg46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben einiger Geräte (z.B. Testsender) kannjedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung.Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Marktgebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.Certificate of the Manufacturer/ImporterIt is hereby certified that the ProSafe Wireless-N VPN Firewall has been suppressed in accordance with the conditionsset out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some equipment (for example, testtransmitters) in accordance with the regulations may, however, be subject to certain restrictions. Please refer to the notesin the operating instructions.Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the marketand has been granted the right to test the series for compliance with the regulations.Voluntary Control Council for Interference (VCCI) StatementThis equipment is in the second category (information equipment to be used in a residential area or an adjacent areathereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data ProcessingEquipment and Electronic Office Machines aimed at preventing radio interference in such residential areas.When used near a radio or TV receiver, it may become the cause of radio interference.Read instructions for correct handling.Additional CopyrightsAESCopyright (c) 2001, Dr Brian Gladman brg@gladman.uk.net , Worcester, UK.All rights reserved.TERMSRedistribution and use in source and binary forms, with or without modification, are permittedsubject to the following conditions:1. Redistributions of source code must retain the above copyright notice, this list ofconditions and the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice, this list ofconditions and the following disclaimer in the documentation and/or other materialsprovided with the distribution.3. The copyright holder's name must not be used to endorse or promote any productsderived from this software without his specific prior written permission.This software is provided 'as is' with no express or implied warranties of correctness or fitnessfor purpose.iiiv1.0, January 2010

Open SSLCopyright (c) 1998-2000 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permittedprovided that the following conditions * are met:1. Redistributions of source code must retain the above copyright notice, this list of conditionsand the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice, this list ofconditions and the following disclaimer in the documentation and/or other materialsprovided with the distribution.3. All advertising materials mentioning features or use of this software must display thefollowing acknowledgment: “This product includes software developed by the OpenSSLProject for use in the OpenSSL Toolkit. (http://www.openssl.org/)”4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse orpromote products derived from this software without prior written permission. For writtenpermission, please contact openssl-core@openssl.org.5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL"appear in their names without prior written permission of the OpenSSL Project.6. Redistributions of any form whatsoever must retain the following acknowledgment: "Thisproduct includes software developed by the OpenSSL Project for use in the OpenSSLToolkit (http://www.openssl.org/)"THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS'' AND ANYEXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITSCONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, ORPROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORYOF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDINGNEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THISSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). Thisproduct includes software written by Tim Hudson (tjh@cryptsoft.com).MD5Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.License to copy and use this software is granted provided that it is identified as the "RSA DataSecurity, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing thissoftware or this function. License is also granted to make and use derivative works providedthat such works are identified as "derived from the RSA Data Security, Inc. MD5 MessageDigest Algorithm" in all material mentioning or referencing the derived work.RSA Data Security, Inc. makes no representations concerning either the merchantability ofthis software or the suitability of this software for any particular purpose. It is provided "as is"without express or implied warranty of any kind.These notices must be retained in any copies of any part of this documentation and/orsoftware.ivv1.0, January 2010

PPPCopyright (c) 1989 Carnegie Mellon University. All rights reserved.Redistribution and use in source and binary forms are permitted provided that the abovecopyright notice and this paragraph are duplicated in all such forms and that anydocumentation, advertising materials, and other materials related to such distribution and useacknowledge that the software was developed by Carnegie Mellon University. The name ofthe University may not be used to endorse or promote products derived from this softwarewithout specific prior written permission.THIS SOFTWARE IS PROVIDED AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIEDWARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OFMERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.Zlibzlib.h -- interface of the 'zlib' general purpose compression library version 1.1.4, March 11th,2002. Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler.This software is provided 'as-is', without any express or implied warranty. In no event will theauthors be held liable for any damages arising from the use of this software. Permission isgranted to anyone to use this software for any purpose, including commercial applications,and to alter it and redistribute it freely, subject to the following restrictions:1. The origin of this software must not be misrepresented; you must not claim that you wrotethe original software. If you use this software in a product, an acknowledgment in theproduct documentation would be appreciated but is not required.2. Altered source versions must be plainly marked as such, and must not be misrepresentedas being the original software.3. This notice may not be removed or altered from any source distribution.Jean-loup Gailly: jloup@gzip.org; Mark Adler: madler@alumni.caltech.eduThe data format used by the zlib library is described by RFCs (Request for Comments) 1950to 1952 in the files ftp://ds.internic.net/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format)and rfc1952.txt (gzip format)Product and Publication DetailsModel Number:SRXN3205Publication Date:January 2010Product Family:VPN FirewallProduct Name:ProSafe Wireless-N VPN FirewallHome or Business Product:BusinessLanguage:EnglishPublication Part Number:202-10416-02Publication Version Number1.0vv1.0, January 2010

viv1.0, January 2010

ProSafe Wireless-N VPN Firewall SRXN3205 Reference ManualContentsProSafe Wireless-N VPN Firewall SRXN3205 Reference ManualAbout This ManualConventions, Formats, and Scope .xiiiHow to Print this Manual .xivRevision History .xivChapter 1IntroductionKey Features .1-1A Powerful, True Firewall with Content Filtering .1-2Autosensing Ethernet Connections with Auto Uplink .1-2Extensive Protocol Support .1-3Advanced VPN Support for Both IPsec and SSL .1-3Wireless Networking Features .1-4Easy Installation and Management .1-5System Requirements .1-5Package Contents .1-6Front Panel Features .1-6Rear Panel Features .1-8Default IP Address, Login Name, and Password Location .1-9Qualified Web Browsers .1-9Chapter 2Connecting to the Internet (WAN)Understanding the Connection Steps .2-1Logging into the VPN Firewall .2-2Navigating the Menus .2-3Configuring the Internet Connection (WAN) .2-4Automatically Detecting and Connecting .2-4Manually Configuring the Internet Connection .2-7viiv1.0, January 2010

ProSafe Wireless-N VPN Firewall SRXN3205 Reference ManualConfiguring the WAN Mode . 2-11Configuring Dynamic DNS .2-12Configuring the Advanced WAN Options (Optional) .2-14Additional WAN Related Configuration .2-15Chapter 3LAN ConfigurationUsing the VPN Firewall as a DHCP Server .3-1Configuring the LAN Setup Options .3-2Managing Groups and Hosts (LAN Groups) .3-5Viewing the LAN Groups Database .3-7Adding Devices to the LAN Groups Database .3-8Changing Group Names in the LAN Groups Database .3-9Configuring DHCP Address Reservation .3-9Configuring Multi Home LAN IP Addresses .3-10Configuring Static Routes . 3-11Configuring Routing Information Protocol (RIP) .3-13Chapter 4Wireless ConfigurationWireless Equipment Placement and Range Guidelines .4-2Understanding the VPN Firewall Wireless Security Options .4-2Configuring Basic Wireless Setup (Without Security) .4-4Testing and Completing Wireless Setup (Without Security) .4-6Testing Wireless Connectivity (Without Security) .4-6Configuring the Wireless Channel Settings (Without Security) .4-7Wireless Security Types and Settings .4-8SSID and WEP/WPA Settings Setup Form .4-9Configuring WEP Security . 4-11Configuring WPA Security Without RADIUS .4-12Configuring WPA Security with RADIUS .4-13Verifying Wireless Connectivity (With Security) .4-16Deploying the VPN Firewall .4-16Configuring Advanced Wireless Settings .4-17Restricting Wireless Access by MAC Address .4-18viiiv1.0, January 2010

ProSafe Wireless-N VPN Firewall SRXN3205 Reference ManualChapter 5Firewall Security and Content FilteringAbout Firewall Security and Content Filtering .5-1Using Rules & Services to Block or Allow Traffic .5-2Services-Based Rules .5-2Viewing the Firewall Rules .5-7Order of Precedence for Rules .5-7Setting the Outbound Policy .5-7Creating a LAN WAN Outbound Services Rule .5-8Creating a LAN WAN Inbound Services Rule .5-9Modifying Rules .5-10Inbound Rules Examples . 5-11Outbound Rules Example .5-14Configuring Other Firewall Features .5-14Attack Checks .5-14Configuring Session Limits .5-17Managing the Application Level Gateway for SIP Sessions .5-18Creating Services, QoS Profiles, and Bandwidth Profiles .5-19Adding Customized Services .5-19Setting Quality of Service (QoS) Priorities .5-21Creating Bandwidth Profiles .5-21Setting Schedules to Block or Allow Specific Traffic .5-24Blocking Internet Sites (Content Filtering) .5-25Enabling Source MAC Filtering (Address Filtering) .5-28Configuring IP/MAC Address Binding .5-29Configuring Port Triggering .5-31Configuring UPnP (Universal Plug and Play) .5-34E-Mail Notifications of Event Logs and Alerts .5-35Administrator Tips .5-36Chapter 6Virtual Private Networking Using IPsecUsing the VPN Wizard for Client and Gateway Configurations .6-1Creating Gateway to Gateway VPN Tunnels with the Wizard .6-2Creating a Client to Gateway VPN Tunnel with the Wizard .6-5Creating a VPN Client to VPN Firewall Connection .6-6ixv1.0, January 2010

ProSafe Wireless-N VPN Firewall SRXN3205 Reference ManualConfiguring the VPN Firewall .6-7Configuring the VPN Client .6-7Testing the Connection .6-10Viewing VPN Firewall VPN Connection Status and Logs . 6-11Managing IPsec VPN Policies .6-12Managing IKE Polices .6-12Configuring VPN Policies .6-20Assigning IP Addresses to Remote Users (Mode Config) .6-27Mode Config Operation .6-28Configuring Mode Config Operation on the VPN Firewall .6-28Configuring Mode Config Operation on the VPN Client .6-32Configuring Extended Authentication (XAUTH) .6-33Configuring XAUTH for VPN Clients .6-34User Database Configuration .6-35RADIUS Client Configuration .6-35Configuring Keepalives and Dead Peer Detection .6-37Configuring Keepalives .6-38Configuring Dead Peer Detection .6-39Configuring NetBIOS Bridging with VPN .6-40Chapter 7Virtual Private Networking Using SSLUnderstanding the Portal Options .7-1Planning for SSL VPN .7-2Creating the Portal Layout .7-3Configuring Domains, Groups, and Users .7-7Configuring Applications for Port Forwarding .7-8Adding Servers .7-8Adding A New Host Name .7-9Configuring the SSL VPN Client .7-10Configuring the Client IP Address Range . 7-11Adding Routes for VPN Tunnel Clients .7-12Using Network Resource Objects to Simplify Policies .7-13Adding New Network Resources .7-13Configuring User, Group, and Global Policies .7-15Viewing Policies .7-17xv1.0, January 2010

ProSafe Wireless-N VPN Firewall SRXN3205 Reference ManualAdding a Policy .7-18Chapter 8Managing Users, Authentication, and CertificatesAdding Authentication Domains, Groups, and Users .8-1Creating a Domain .8-1Creating a Group .8-5Creating a New User Account .8-6Setting User Login Policies .8-7Changing Passwords and Other User Settings .8-9Managing Certificates . 8-11Viewing and Loading CA Certificates .8-12Viewing Active Self Certificates .8-13Obtaining a Self Certificate from a Certificate Authority .8-14Managing your Certificate Revocation List (CRL) .8-17Chapter 9VPN Firewall and Network ManagementPerformance Management .9-1Bandwidth Capacity .9-1Features that Reduce Traffic .9-2Features that Increase Traffic .9-4Using QoS to Shift the Traffic Mix .9-7Tools for Traffic Management .9-7Changing Passwords and Administrator Settings .9-8Enabling Remote Management Access .9-9Using an SNMP Manager .9-12Managing the Configuration File .9-14Configuring Date and Time Service .9-17Chapter 10Monitoring System PerformanceActivating Notification of Events and Alerts .10-1Viewing the Logs .10-4Enabling the Traffic Meter .10-5Viewing VPN Firewall Configuration and System Status .10-8Monitoring VPN Firewall Statistics .10-10Monitoring the WAN Port Status .10-10xiv1.0, January 2010

ProSafe Wireless-N VPN Firewall SRXN3205 Reference ManualMonitoring Attached Devices . 10-11Viewing the DHCP Log .10-13Monitoring Active Users .10-14Viewing the Port Triggering Status .10-14Monitoring the VPN Tunnel Connection Status .10-15Viewing the VPN Logs .10-17Chapter 11TroubleshootingBasic Functions . 11-1Power LED Not On . 11-2LEDs Never Turn Off . 11-2LAN or WAN Port LEDs Not On . 11-2Troubleshooting the Web Configuration Interface . 11-3Troubleshooting the ISP Connection . 11-4Troubleshooting a TCP/IP Network Using a Ping Utility . 11-5Testing the LAN Path to Your VPN Firewall . 11-5Testing the Path from Your PC to a Remote Device . 11-6Restoring the Default Configuration and Password . 11-7Problems with Date and Time . 11-7Using the Diagnosti

Phone: 1-888-NETGEAR, for US & Canada only. For other countries, see your Support information card. . All advertising materials mentioning features or use of this software must display the . Home or Business Product: Business Language: English Publication Part Number: 202-10416-02 Publication Version Number 1.0.