This article describes installation and configuration steps for NetFox Next Generation Firewall (NGFW). Model tested NF-EN6200.

1. The integration is available for NetFox NF Series of Next Generation Firewall (NGFW) only
2. Support on NF-10 Series of SDWAN Routers not available
3. NAS add on license is required in NF-Series to do the necessary configuration for the Radius integration
4. NF Series is a NGFW product built with Routing, DPI Firewall, Web Security and VPN Modules along with NAS (UAM) integration add on module

Download manufacturer NetFox Antamedia UAM-NAS Manual

NF Series – Basic Configuration

1. Laptop / Desktop with any standard browser (IE/Chorme/Firefox/Safari)
2. Ethernet cable (Preferably CAT-6 or above)

1. Unpack the NetFox NF Series box (Based on the choice of the model either it will be with a power adapter or built-in Power Supply Unit (PSU).
2. Power on the NGFW, you can able to hear a single beep on initial power and after 40 secs a double beep. This indicates the NGFW is booted and ready to do the initial configuration
3. For example, if you have a product with 4 Ethernet ports named Port1 – Port4 then connect the Laptop / Desktop to Port-3 using the CAT-6 cable
4. Ensure your Laptop / Desktop Ethernet Adaptor is set as “Obtain IP Automatically”
5. Open a browser and type
6. https server certificate error will occur as it has as self-signed certificate, click on “Advanced” and then click on “Accept the Risk and Continue”.
7. Login page will open and request for username & password
8. Type username as “admin” & Password as “admin99”
9. Product Dashboard screen will open with all the required details.

1. Click on the “Configuration” tab which is next to “Dashboard”. This will open up all the available configuration in product
2. In “Configurations” click on “Network Settings” and choose “WAN-1”
3. Choose the WAN Connection Type as per the ISP link details either as PPPoE, DHCP, or Static
4. Do the required configuration as per the ISP link details
5. In case if you choose DHCP or in Static IP with local IP or NAT-ed IP address then
6. In the “Link Properties” on the “Link Failure Detection” option choose “Ping Remote IP” and configure Remote IP as “”

7. With this the configuration for the “WAN-1” is done, click on the “Save” and “Restart Service”
8. Connect the ISP link Ethernet cable to “PORT-1” of the NF NGFW appliance
9. Click on “Dashboard” to check whether the ISP link came up and working in the firewall

10. WAN-1 / WAN-2 status can also view from “Dashboard” – “IPV4 Port Status” from the left side tree
11. In case if the location has more than 1 Internet connection then follow the above steps to configure the second internet connection in “WAN-2” and connect the ISP link Ethernet cable to PORT-2 in the NF NFGW appliance.

1. LAN-1 is part of “Confguration – Network Settings – LAN-1 (The physical port in the NGFW appliance is PORT-3)

Please note: In case the appliance you have purchased has 6 Ethernet Port by default then the LAN-1 physical port is named as “PORT-4” in the sticker.

2. The default LAN-1 interface IP is and the DHCP Server is enabled with DHCP pool range from –

3. If required the LAN IP can be changed as per choice of the customer and subsequently the DHCP pool size can also be increased to meet the DHCP expected ranges.
4. Additionally, if LAN-2 (a separate LAN Segment is required can also be configured under LAN-2 configuration tab

Configuring UAM – Hotspot NAS Module

Network Access Server (NAS) / Universal Access Method (UAM)

NAS Module has 3 configurable screens
• NAS Server Settings
• Exclusions (Whitelist IP / Domains)
• Bandwidth Settings (on the ISP level)

NAS Settings: Server Settings

NAS: Server Settings


Service – Checkbox used to enable or disable the NAS Module. The NAS module is enabled when the checkbox is selected
Description – Relevant name to identify the NAS Module

NAS: Server Settings

Radius Server Settings

NAS Identifier – Identifier used to identify the UAM / NAS to post the details back from Radius Server
Values: Name or MAC address
Example: Name: ANTAMEDIA-BLR | MAC: 00:0A:00:00:00:00
Accounting Server – External Radius Server
Radius Server IP / Name13.92.228.228
NAS Secret – Contact our office
NAS IP – IP address of the UAM / NAS
Supported Values: Auto Detect | Specify
On choice of specify the IP address of the NAS can be configured
Protocol – UDP
Authentication Port1812
Accounting Port – 1813
Interim Update Interval – Time interval in which the UAM/NAS provide usage information to Radius server
Values: max up to 10 minutes | Default: 3 mins
CoA Port – 3799 (Standard Port)

NAS: Server Settings

User Login Settings

Authentication Method – Radius Login
NAS Web Server Address – Values: Auto Detect & Specify | Default: Auto Detect
On choice of specify the IP / Name of the NAS web server can be configured
Captive Portal
Internal Web Server (Port 80)
Internal SSL Web Server (Port 443)
External Web Server (Port 80)
External SSL Web Server (Port 443)
Choose – External SSL Web Server
External web server URL to be configured is

Internal Web Server Port – 2280 (This is the port use by NAS to communicate to the guest users)
Redirect URL after login
Original Request URL
Specify Redirect URL
Welcome URL
the Redirect URL after login is controlled by the Radius server

Account Status after login
1. Show in Popup Window (Pop up windows with login successful message along with time, reset password option (user details)
2. Disable
It is advisable to configure as “Disable” as most of the apple IOS wont support show in pop window

User Idle Timeout(min) – Values: From 5 – 14400 mins | Default:30 mins

NAS: Server Settings

Server Settings: MAC authentication

MAC Authentication Method
MAC as username
MAC as username and password
Default: Disable

NAS: Server Settings

Firewall Zone (not editable)

Source Zone – LAN
Destination Zone – WAN
UAM Port – 2281

NAS Settings: Exclusion (Whitelist)

NetFox NAS exclusion support whitelist of domains, exclusion of IPV4 IP, IPV6 IP and Source MAC.
The IP address, MAC and domains added in the exclusion list do not require authentication from Radius or in other words will work without Radius authentication.

NAS: Exclusions

Exclude Source IPV4 address – Values: None | Specify
For IP to exclude from Radius Authentication please choose “Specify” and add the IPV4 IP address

Exclude Destination IPV4 address – Values: None | Specify
For the destination IPs to get exclude from Radius Authentication please choose “Specify” and add the IPV4 Destination IP address

Exclude Source MAC – Values: None | Specify
To exclude source MAC address of a selected devices choose “Specify” and add the MAC address

Exclude Source IPV6 address – Values: None | Specify
For IP to exclude from Radius Authentication please choose “Specify” and add the IPV6 IP address

Exclude Destination IPV6 address – Values: None | Specify
For the destination IPs to get exclude from Radius Authentication please choose “Specify” and add the IPV6 Destination IP address

Exclude Destination Domain – Values: None | Specify
To whitelist domains from Radius server authentication choose “Specify” and input the domain names


The domains that should be whitelisted from UAM-NAS module:

NAS Settings: Bandwidth Settings

NetFox NAS Bandwidth Settings has support to add multiple ISP connection bandwidth speeds which helps to aggregate the bandwidth and ensure the dynamic algorithm is kicking in the right time to manage the bandwidth for the guest users.

If the location has only one ISP link, then input the upload and download bandwidth of the ISP link in the Bandwidth Settings tab.

Please note: The bandwidth speed calculation is set in “kbps”

For example: If a customer has only one ISP link then do the following:

1. Click on NAS Settings – Bandwidth Settings
2. Set Bandwidth Manager as “Enable”
3. In the “Default WAN Interface Bandwidth settings “Input the Default Upload and Download bandwidth of the IPS link
4. Click on “save” and then Restart Service

In case the customer has multiple ISP links, then in the “Default WAN Interface Bandwidth Settings” add all the ISP links which is getting configured in NF Series and then input in Upload and Download bandwidth. Then click on “Configure”

1. WAN Interface Bandwidth settings will open
2. Click on “Add”
3. “Enable” the Interface
4. Choose the WAN Interface from the dropdown menu (example: WAN1, WAN2, WAN4G)
5. Input the upload and download bandwidth as per the ISP plan
6. Repeat the above for the other available ISP links configured in the NF Series firewall

Option to upload SSL Certificates

To upload the SSL Certificates

1. Click on the “Administration” tab
2. Choose System Management option in the left tree 3. Click on Web Server Settings 4. Click on “Upload Customer Certificate”
5. Upload the relevant certificate, Private key and Certificate Chain

Please note: only “pem” format is supported!

Updated on March 20, 2024

Was this article helpful?