EasyManua.ls Logo

NETGEAR SRX5308 - ProSafe® Quad WAN Gigabit SSL VPN Firewall User Manual

NETGEAR SRX5308 - ProSafe® Quad WAN Gigabit SSL VPN Firewall
384 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
202-10536-01
April 2010
v1.0
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
ProSafe Gigabit Quad WAN
SSL VPN Firewall SRX5308
Reference Manual

Table of Contents

Other manuals for NETGEAR SRX5308 - ProSafe® Quad WAN Gigabit SSL VPN Firewall

Questions and Answers:

NETGEAR SRX5308 - ProSafe® Quad WAN Gigabit SSL VPN Firewall Specifications

General IconGeneral
WAN Ports4
VPN Throughput50 Mbps
DHCP ServerYes
NATYes
VPN SupportIPSec, PPTP, SSL
Routing ProtocolsRIP v1, RIP v2, Static Routing
ManagementWeb-based
Firewall TypeStateful Packet Inspection (SPI)
Power Supply100-240V AC, 50-60Hz
Operating Temperature0°C to 40°C
Storage Temperature-4°F to 158°F (-20°C to 70°C)
Humidity90% maximum relative humidity, noncondensing

Summary

About This Manual

Conventions, Formats, and Scope

Defines typographical conventions and formats used for special messages in the manual.

How to Print This Manual

Provides instructions for viewing and printing the manual using Adobe Acrobat Reader.

Revision History

Details the version history of the reference manual, including part numbers and publication dates.

Chapter 1 Introduction

What Is the ProSafe Gigabit Quad WAN SSL VPN Firewall?

Overview of the SRX5308's purpose, security features, and connectivity.

Key Features and Capabilities

Highlights the SRX5308's main functionalities and hardware advantages.

Hardware Features

Details the front and rear panel components and features of the SRX5308.

Chapter 2 Connecting the VPN Firewall to the Internet

Understanding the Internet and WAN Configuration Tasks

Explains the typical steps and considerations for connecting the firewall to the internet.

Configuring the Internet Connections

Guides through setting up WAN ports for secure internet connectivity.

Configuring the WAN Mode

Covers selecting auto-rollover, load balancing, or primary WAN modes for internet connectivity.

Chapter 3 LAN Configuration

Managing Virtual LANs and DHCP Options

Details configuring virtual LANs and managing DHCP settings for network segmentation.

Managing Routing

Covers configuring static routes and understanding routing information protocols.

Chapter 4 Firewall Protection

Using Rules to Block or Allow Specific Kinds of Traffic

Details creating firewall rules for inbound and outbound traffic control.

Configuring Other Firewall Features

Covers advanced features like attack checks, session limits, and ALG.

Content Filtering (Blocking Internet Sites)

Guides on restricting access to specific websites and web components.

Chapter 5 Virtual Private Networking Using IPsec Connections

Using the IPsec VPN Wizard for Client and Gateway Configurations

Provides guidance on using the wizard to set up VPN tunnels between gateways or clients.

Managing IPsec VPN Policies

Explains how to edit or add VPN and IKE policies for IPsec connections.

Chapter 6 Virtual Private Networking Using SSL Connections

Planning for an SSL VPN

Outlines the basic steps for setting up and activating SSL VPN connections.

Configuring Applications for Port Forwarding

Guides on defining internal server addresses and port numbers for TCP applications.

Configuring the SSL VPN Client

Details assigning IP addresses to remote VPN tunnel clients.

Chapter 7 Managing Users, Authentication, and Certificates

Configuring VPN Authentication Domains, Groups, and Users

Details creating domains, groups, and user accounts for authentication.

Managing Digital Certificates

Explains the use of digital certificates for VPN authentication and secure web access.

Chapter 8 Network and System Management

Performance Management

Focuses on controlling traffic to optimize performance and reduce bottlenecks.

System Management

Covers tasks like password changes, remote access, and configuration file management.

Chapter 9 Monitoring System Access and Performance

Enabling the WAN Traffic Meter

Guides on activating traffic metering for WAN ports to monitor usage.

Activating Notification of Events, Alerts, and Syslogs

Explains how to configure logging and email notifications for important events.

Viewing Status and Log Screens

Describes how to view real-time status information and logs.

Chapter 10 Troubleshooting and Using Online Support

Basic Functioning

Covers the expected sequence of events after powering on the VPN firewall.

Troubleshooting the Web Management Interface

Provides steps to resolve issues when accessing the Web Management Interface.

Troubleshooting the ISP Connection

Guides on diagnosing and resolving problems with the internet connection.

Appendix A Default Settings and Technical Specifications

VPN Firewall Default Configuration Settings

Lists the default settings for router login, internet connection, LAN, and firewall.

VPN Firewall Physical and Technical Specifications

Details physical dimensions, power requirements, and network compatibility.

VPN Firewall IPsec VPN Specifications

Outlines specifications for IPsec VPN, including user support and algorithms.

VPN Firewall SSL VPN Specifications

Details specifications for SSL VPN, including user support and versions.

Appendix B Network Planning for Multiple WAN Ports

What to Consider Before You Begin

Discusses initial planning steps for networks with multiple WAN ports.

Virtual Private Networks

Explains IP addressing requirements for VPN tunnels in dual WAN configurations.

Appendix C System Logs and Error Messages

System Log Messages

Categorizes and explains log messages generated by traffic and system daemons.

Routing Logs

Explains logging messages for network segments like LAN to WAN for debugging.

Appendix D Two-Factor Authentication

Why Do I Need Two-Factor Authentication?

Explains the importance of 2FA in addressing modern network security threats.

What Are the Benefits of Two-Factor Authentication?

Highlights advantages like stronger security and no need for hardware replacement.

NETGEAR Two-Factor Authentication Solutions

Introduces NETGEAR's implemented solutions, focusing on WiKID.

Appendix F Notification of Compliance

Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice

Details FCC compliance for Class B digital devices and measures for interference.

EU Regulatory Compliance Statement

States compliance with EU Council Directives and relevant standards.

Related product manuals