Multi-Tech Systems RF660 User Manual

Page 5

Advertising
background image

Table of Contents

Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D)

5

Packet Filters................................................................................................................................................................. 101

Packet Filters > Packet Filter Rules......................................................................................................................101

Packet Filters > ICMP...........................................................................................................................................103

Packet Filters > Advanced ....................................................................................................................................104

Packet Filters > Enable/Disable Log.....................................................................................................................105

VPN (Virtual Private Networks)...................................................................................................................................... 106

VPN > IPSec.........................................................................................................................................................106

Introduction to Virtual Private Networks................................................................................................................106

VPN > x.509 Certificates.......................................................................................................................................111

VPN > IPSec Bridging ..........................................................................................................................................111

VPN > PPTP.........................................................................................................................................................112

Wizard Setup ................................................................................................................................................................. 114

Statistics & Logs ............................................................................................................................................................ 116

Statistics & Logs > Uptime....................................................................................................................................117

Statistics and Logs > Hardware ............................................................................................................................117

Statistics and Logs > Networks.............................................................................................................................118

Statistics & Logs > Interfaces ...............................................................................................................................120

Statistics & Logs > SMTP Proxy ...........................................................................................................................121

Statistics & Logs > Accounting .............................................................................................................................122

Statistics & Logs > Self Monitor ............................................................................................................................123

Statistics & Logs > IPSec......................................................................................................................................124

Statistics & Logs > PPTP......................................................................................................................................124

Statistics & Logs > Packet Filter ...........................................................................................................................125

Statistics & Logs > Port Scans..............................................................................................................................126

Statistics & Logs > View Logs...............................................................................................................................126

Statistics & Logs > HTTP Access .........................................................................................................................127

Statistics & Logs > DHCP .....................................................................................................................................128

Statistics & Logs > SMTP & POP3 Virus Quarantines..........................................................................................129

Statistics & Logs > SMTP SPAM Quarantines......................................................................................................129

Statistics & Logs > Administrative Authentication Log ..........................................................................................129

Chapter 7 – User Authentication Methods...................................................................................................... 130

Proxy Services and Authentication Methods ........................................................................................................130

Which Method Should You Choose? ....................................................................................................................130

Authentication Setup...................................................................................................................................................... 131

Setting Up RADIUS Authentication.......................................................................................................................131

Setting Up A Microsoft IAS RADIUS Server .........................................................................................................131

Setting Up NT/2000 SAM (SMB) Authentication...................................................................................................132

Chapter 8 – Frequently Asked Questions (FAQs).......................................................................................... 133

Chapter 9 – Troubleshooting ........................................................................................................................... 139

Appendix A – Disposition of Events for the RouteFinder v3.2x................................................................... 141

1. Abstract ..................................................................................................................................................................... 142

II. Inbound Access Log .................................................................................................................................................. 143

III. Outbound Access Log .............................................................................................................................................. 145

IV. Access Requests through Firewall Dropped ............................................................................................................ 146

V. Access Requests to Firewall Dropped....................................................................................................................... 146

VI. Administrative Authentication Logs .......................................................................................................................... 147

VII. Admin Port Access Log ........................................................................................................................................... 147

VIII. Startup History Log................................................................................................................................................. 147

IX. User Log................................................................................................................................................................... 147

Advertising
This manual is related to the following products: