vi
v1.0, October 2005
Troubleshooting Tips ......................................................................................................3-6
Overview of How to Access the FVG318 wireless VPN firewall .....................................3-7
How to Log On to the FVG318 After
Configuration Settings Have Been Applied ..............................................................3-9
How to Bypass the Configuration Assistant ...........................................................3-10
Using the Smart Setup Wizard .....................................................................................3-11
How to Manually Configure Your Internet Connection ..................................................3-12
Chapter 4
Wireless Configuration
Observing Performance, Placement, and Range Guidelines .........................................4-1
Implementing Appropriate Wireless Security .................................................................4-2
Understanding Wireless Settings ...................................................................................4-3
Default Factory Settings ...........................................................................................4-6
Before You Change the SSID and WEP Settings ....................................................4-6
How to Set Up and Test Basic Wireless Connectivity ..............................................4-7
How to Restrict Wireless Access by MAC Address .................................................4-9
How to Configure WEP ..........................................................................................4-10
How to Configure WPA with Radius .......................................................................4-12
How to Configure WPA2 with Radius .....................................................................4-14
How to Configure WPA and WPA2 with Radius .....................................................4-15
How to Configure WPA-PSK ..................................................................................4-17
How to Configure WPA2-PSK ................................................................................4-18
How to Configure WPA-PSK and WPA2-PSK ........................................................4-20
Chapter 5
Firewall Protection and
Content Filtering
Firewall Protection and Content Filtering Overview ........................................................5-1
Block Sites ......................................................................................................................5-2
Using Rules to Block or Allow Specific Kinds of Traffic ..................................................5-4
Inbound Rules (Port Forwarding) .............................................................................5-6
Outbound Rules (Service Blocking) .........................................................................5-9
Order of Precedence for Rules ..............................................................................5-11
Default DMZ Server ...............................................................................................5-13
Attack Checks ........................................................................................................5-14
Services ........................................................................................................................5-15