Presentation is loading. Please wait.

Presentation is loading. Please wait.

FVS336G PROSAFE™ DUAL WAN GIGABIT FIREWALL WITH SSL & IPSEC VPN Presented by Hien Ly L3 Support Engineer.

Similar presentations


Presentation on theme: "FVS336G PROSAFE™ DUAL WAN GIGABIT FIREWALL WITH SSL & IPSEC VPN Presented by Hien Ly L3 Support Engineer."— Presentation transcript:

1 FVS336G PROSAFE™ DUAL WAN GIGABIT FIREWALL WITH SSL & IPSEC VPN Presented by Hien Ly L3 Support Engineer

2 2. © 1996-2006 NETGEAR ®. All rights reserved Course Agenda »Introductions »Course Objectives FVS336G Features Specific features on FVS336G Firewall & Router overview VPN overview SSL overview »FVS336G Administration GUI walk-through »FVS336G User SSL Portal walk-through »FAQ »Known Issues »Q&A

3 3. © 1996-2006 NETGEAR ®. All rights reserved Introduction »Course Description: This training is intended to provide background and update information about the new ProSafe dual WAN gigabit firewall with IPSec and SSL VPN »Course Audience: L2, L3, SE, VAR »Course Prerequisites: Familiarity & knowledge of NETGEAR ProSafe VPN firewall products Basic knowledge & understanding for VPN (IPSec & SSL) concepts Basic usage of VPN configuration on the NETGEAR ProSafe VPN products

4 4. © 1996-2006 NETGEAR ®. All rights reserved Course Objectives »At the end of this course, Technical Support Engineers should be able to do the following: Identify the differences between the FVS336G and other NETGEAR Firewall VPN routers List and describe unique features on the FVS336G Identify and list the differences SSL features on the FVS336G and the SSL312 Configure and setup SSL Portal on the FVS336G

5 5. © 1996-2006 NETGEAR ®. All rights reserved FVS336G Usage

6 6. © 1996-2006 NETGEAR ®. All rights reserved Features & Benefits »Dual 10/100/1000 Mbps Gigabit Ethernet WAN ports for load balancing or failover/rollover. »Built-in four-port 10/100/1000 Mbps Gigabit Ethernet LAN switch. »Supports 25 concurrent IPsec VPN tunnels. »Supports 10 concurrent SSL VPN sessions. »Bundled with the single-user license of the NETGEAR ProSafe VPN Client software (VPN01L) »Supports SNMP v2c »Italicized are new features specific to the FVS336G only

7 7. © 1996-2006 NETGEAR ®. All rights reserved Package Contents »ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. »One AC power cable (100-240 VAC, 50-60 Hz). »Rubber feet. »One Category 5 (Cat5) Ethernet cable. »Installation Guide: FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. »Resource CD, including: Application Notes and other helpful information. ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual ProSafe VPN Client Software – one user license. »Warranty and Support Information Card.

8 8. © 1996-2006 NETGEAR ®. All rights reserved Front Panel

9 9. © 1996-2006 NETGEAR ®. All rights reserved Rear Panel »Factory Defaults button Using a sharp object, press and hold this button for about ten seconds until the front panel TEST light flashes to reset the FVS336G to factory default settings. All configuration settings will be lost and the default password will be restored. »LAN & WAN ports Auto MDI/MDIX, Gigabit Ethernet ports »AC Power Universal AC input (100-240 VAC, 50-60 Hz) »On/off power switch

10 10. © 1996-2006 NETGEAR ®. All rights reserved Bottom label »Default LAN IP address: 192.168.1.1 »Default username: admin »Default password: password

11 11. © 1996-2006 NETGEAR ®. All rights reserved Hardware Specifications »Processor Speed: 300 MHz (Cavium CN3005SCP) »Memory: 16 MB flash, 64 MB DRAM »Power adapter: 12V DC, 1.2A -plug is localized to country of sale »Dimensions: 25.4 x 17.8 x 3.96 cm (10 x 7 x 1.56 in) »Weight: 1.7 kg (3.7 lb) »Operating temperature: 0° to 40°C (32° to 104°F) »Operating humidity: 90% maximum relative humidity, non-condensing

12 12. © 1996-2006 NETGEAR ®. All rights reserved Technical Support Info Serial Prefix: 1PD Item Number Business UnitQuantityXF DateShip ModeETA at DC FVS336G-100AUS DCIHKN7010/19/2007S9/21/2007 FVS336G-100EES DCINLN20010/12/2007S10/16/2007 FVS336G-100EES DCINLN4010/26/2007S11/27/2007 FVS336G-100ISS DCIHKN7010/12/2007S9/28/2007 FVS336G-100ISS DCINLN50010/12/2007S10/16/2007 FVS336G-100ISS DCINLN28010/19/2007S10/16/2007 FVS336G-100NAS DCUSN309/28/2007S10/22/2007 FVS336G-100NAS DCUSN70010/12/2007S10/8/2007 FVS336G-100UKS DCINLN40010/19/2007S10/16/2007 FVS336G-100UKS DCINLN15010/26/2007S11/27/2007

13 13. © 1996-2006 NETGEAR ®. All rights reserved Performance Spec »Throughput: »LAN-to-WAN: 60 Mbps total »IPsec VPN (3DES): 16 Mbps »SSL VPN: 10 Mbps »Connections: »10,000 concurrent sessions

14 FVS336G GUI

15 15. © 1996-2006 NETGEAR ®. All rights reserved Admin GUI »http://192.168.1.1http://192.168.1.1 »Username: admin »Password: password »Domain: geardomain

16 16. © 1996-2006 NETGEAR ®. All rights reserved Network – WAN settings

17 17. © 1996-2006 NETGEAR ®. All rights reserved Network – WAN mode

18 18. © 1996-2006 NETGEAR ®. All rights reserved WAN Mode

19 19. © 1996-2006 NETGEAR ®. All rights reserved »If you want to use a redundant ISP link for backup purposes, select the WAN port that will act as the primary link for this mode. Ensure that the backup WAN port has also been configured and that you configure the WAN Failure Detection Method to support Auto-Rollover. »Link failure is detected in one of the following ways: By sending DNS queries to a DNS server, or By sending a Ping request to an IP address, or None (no failure detection is performed). »From each WAN interface, DNS queries or Ping requests are sent to the specified IP address. If replies are not received, after a specified number of retries, the corresponding WAN interface is considered down. »As long as the primary link is up, all traffic is sent over the primary link. Once the primary WAN interface goes down, the rollover link is brought up to send the traffic. Traffic will automatically roll back to the original primary link once the original primary link is back up and running again. WAN Mode – Auto-Rollover

20 20. © 1996-2006 NETGEAR ®. All rights reserved WAN Mode – Load Balancing

21 21. © 1996-2006 NETGEAR ®. All rights reserved »The VPN firewall distributes the outbound traffic equally among the WAN interfaces that are functional. »Scenarios could arise when load balancing needs to be bypassed for certain traffic or applications. If certain traffic needs to travel on a specific WAN interface, configure protocol binding rules for that WAN interface. The rule should match the desired traffic. In the Protocol Binding menu, you specify a protocol such as HTTP, and this causes all outbound traffic of that protocol to use that WAN port. WAN Mode – Load Balancing

22 22. © 1996-2006 NETGEAR ®. All rights reserved Dynamic DNS

23 23. © 1996-2006 NETGEAR ®. All rights reserved LAN Settings

24 24. © 1996-2006 NETGEAR ®. All rights reserved LAN Settings – Multi-homing The secondary LAN IP address will be assigned to the LAN interface of the router and can be used as a gateway by computers on the secondary subnet

25 25. © 1996-2006 NETGEAR ®. All rights reserved »If you have computers on your LAN using different IP address ranges (for example, 172.16.2.0 or 10.0.0.0), you can add “aliases” to the LAN port, giving computers on those networks access to the Internet through the router. This allows the router to act as a gateway to additional logical subnets on your LAN NOTE: IP addresses on these secondary subnets cannot be configured in the DHCP server. The hosts on the secondary subnets must be manually configured with IP addresses, gateway IP addresses, and DNS server IP addresses. LAN Settings – Multi-homing

26 26. © 1996-2006 NETGEAR ®. All rights reserved Security – Services

27 27. © 1996-2006 NETGEAR ®. All rights reserved Security – Scheduling

28 28. © 1996-2006 NETGEAR ®. All rights reserved Security – Block Sites

29 29. © 1996-2006 NETGEAR ®. All rights reserved Security – Firewall Rules

30 30. © 1996-2006 NETGEAR ®. All rights reserved Firewall Rules – Adding Inbound

31 31. © 1996-2006 NETGEAR ®. All rights reserved Firewall Rules – Adding Outbound

32 32. © 1996-2006 NETGEAR ®. All rights reserved Security – Source MAC Filter

33 33. © 1996-2006 NETGEAR ®. All rights reserved Security – Port Triggering

34 34. © 1996-2006 NETGEAR ®. All rights reserved Security – Port Triggering Once configured, operation is as follows: 1.A PC makes an outgoing connection using a port number defined in the Port Triggering table. 2.This Router records this connection, opens the INCOMING port or ports associated with this entry in the Port Triggering table, and associates them with the PC. 3.The remote system receives the PCs request, and responds using a different port number. 4.This Router matches the response to the previous request, and forwards the response to the PC. (Without Port Triggering, this response would be treated as a new connection request rather than a response. As such, it would be handled in accordance with the Port Forwarding rules.) Note: »Only 1 PC can use a "Port Triggering" application at any time. »After a PC has finished using a "Port Triggering" application, there is a "Time-out" period before the application can be used by another PC. This is required because this Router cannot be sure when the application has terminated. »Normally for games and chat.

35 IPSec VPN

36 36. © 1996-2006 NETGEAR ®. All rights reserved Netgear IPSec VPN – VPN Wizard Box-to-box

37 37. © 1996-2006 NETGEAR ®. All rights reserved Netgear IPSec VPN – VPN Wizard Client-to-box

38 38. © 1996-2006 NETGEAR ®. All rights reserved VPN Policy

39 39. © 1996-2006 NETGEAR ®. All rights reserved VPN Policy – Traffic Selection

40 40. © 1996-2006 NETGEAR ®. All rights reserved VPN Policy – Policy Parameters

41 41. © 1996-2006 NETGEAR ®. All rights reserved IKE Policy

42 42. © 1996-2006 NETGEAR ®. All rights reserved IKE Policy – IKE parameters

43 43. © 1996-2006 NETGEAR ®. All rights reserved VPN – Certificate Authority (CA)

44 44. © 1996-2006 NETGEAR ®. All rights reserved Generate Self-sign Certificate

45 45. © 1996-2006 NETGEAR ®. All rights reserved View Certificate Request

46 46. © 1996-2006 NETGEAR ®. All rights reserved Certificate Revocation List (CRL)

47 47. © 1996-2006 NETGEAR ®. All rights reserved Mode Config

48 48. © 1996-2006 NETGEAR ®. All rights reserved VPN Client – RADIUS Client

49 SSL VPN

50 50. © 1996-2006 NETGEAR ®. All rights reserved SSL VPN – Setup Process 1.Create User Portal VPN > SSL VPN > Portal Layouts 2.Create Domain Users > Domains Select the authentication scheme Link the new domain to the new portal that you have created in step #1 3.Create Group Users > Groups A default group will be created when a domain is created (this is be indicated with a “*”) You can create other groups under each domain 4.Create User Users > Users Define Login policies

51 51. © 1996-2006 NETGEAR ®. All rights reserved SSL – Portal Layout

52 52. © 1996-2006 NETGEAR ®. All rights reserved SSL – Domain

53 53. © 1996-2006 NETGEAR ®. All rights reserved SSL – Groups

54 54. © 1996-2006 NETGEAR ®. All rights reserved SSL – Users

55 55. © 1996-2006 NETGEAR ®. All rights reserved SSL – User Policies »Deny/Allow users login NOTE: This apply to Remote Management access for ALL users, including Administrator access.

56 56. © 1996-2006 NETGEAR ®. All rights reserved SSL – User Policies »Deny/Allow client access based on Source IP address

57 57. © 1996-2006 NETGEAR ®. All rights reserved SSL – User Policies »Deny/Allow client access based on web browser

58 Administrator Settings & Troubleshooting

59 59. © 1996-2006 NETGEAR ®. All rights reserved Administrative Features

60 60. © 1996-2006 NETGEAR ®. All rights reserved Traffic Meter

61 61. © 1996-2006 NETGEAR ®. All rights reserved »Allows you to measure and limit the traffic routed by the router. »The router will keep a record of the volume of traffic going from the selected interface. »The router can also be configured to place a restriction on the volume of data being transferred. Traffic Meter

62 62. © 1996-2006 NETGEAR ®. All rights reserved Attack Checks

63 63. © 1996-2006 NETGEAR ®. All rights reserved Firewall Logs

64 64. © 1996-2006 NETGEAR ®. All rights reserved Email Logs

65 65. © 1996-2006 NETGEAR ®. All rights reserved Syslog

66 66. © 1996-2006 NETGEAR ®. All rights reserved VPN Logs

67 Frequently Asked Questions & Known Issues

68 68. © 1996-2006 NETGEAR ®. All rights reserved FAQ »Does the SSL require any additional VPN software? No, the main intention of the SSL VPN is that users do not need to install any client software on their PCs. Users only need a web browser that can support ActiveX or Java. »How many simultaneous VPN connections does FVS336G support? It supports up to 25 IPSec VPN tunnels and 10 SSL VPN tunnels. »Can I manage the box using a port number different from standard HTTPS port number 443, and use 443 for port- forwarding to an internal web server? No, not yet. You need to use standard port number 443 to manage the box via HTTPS. To access internal web server by port 443, please use SSL or IPSEC VPN tunnel access.

69 69. © 1996-2006 NETGEAR ®. All rights reserved FAQ »How many simultaneous VPN connections does FVS336G support? It supports up to 25 IPSEC VPN tunnels and 10 SSL VPN tunnels. »Does the FVS336G have all the features of the SSL312 VPN Concentrator? No, the FVS336G SSL VPN only provide full SSL VPN tunnel and Port Forwarding. For full features of the SSL VPN, we recommend that you purchase a stand alone SSL312 SSL VPN concentrator. »Do you need additional hardware to use the SSL VPN feature? No, the SSL VPN is part of the software feature available on the FVS336G. You may need an authentication server if you are not using the local user database on the FVS336G.

70 70. © 1996-2006 NETGEAR ®. All rights reserved Known Issues »Dropped packets are not logged thought it matches firewall rule with log option turns on. »Admin and guest login from WAN are enabled by default »Disabling remote management will disable SSL VPN »Vonage incoming call form WAN rings, but no voice »VPN rollover does not work if both WAN interfaces are on the same subnet (not common) »Inbound rule with second public address on a different subnet from WAN interface address does not work if the traffic is initiated from a host directly on this subnet (Not common, normally there is a router in between and that works). »In Load Balancing mode, a host directly connected to WAN port can ping WAN1, not WAN2. (not a common case, normally there is a router in between and that works.) »In load balancing mode, SSL VPN user directly connected to WAN port can establish VPN tunnel to WAN1, not WAN2. (not a common case, normally there is a router inbetween and that works.)

71 71. © 1996-2006 NETGEAR ®. All rights reserved Known Issues »Login page is not displayed properly if if admin comes in via FVX538 inbound rule to login to the WAN port of FVS336G. (This is a common deployment case). »Host names in SSL port forwarding cannot mix upper and lower case letters. »SSL VPN denial policy does not block ping traffic unless the high port number is blank. »SSL VPN global policy "edit" button does not display "Service" on the edit web page (The work-around is to delete the policy and recreate it). »The change password option should be grayed out if SSL VPN user is authenticated via Active Directory, Radius or LDAP. It has no effect. »Port forwarding https port 443 via a secondary public WAN IP in inbound rule cannot reach internal web server (The work-around is to use SSL VPN to access internal web server). »PPPoE auto-detect displays "No service detected", although it has already acquired WAN IP address and is functioning.

72 72. © 1996-2006 NETGEAR ®. All rights reserved Known Issues »When adding a SSL VPN resource, the IP address is not part of the configuration and is only availabe from "edit" button. »Raritan KVM client through SSL Port Forwarding gets disconnected after being idle for a while (The work around is to use SSL VPN tunnel instead of Port Forwarding).

73 Thank You! Q & A


Download ppt "FVS336G PROSAFE™ DUAL WAN GIGABIT FIREWALL WITH SSL & IPSEC VPN Presented by Hien Ly L3 Support Engineer."

Similar presentations


Ads by Google