Virtual Private Networking; Overview Of Vpn Configuration - NETGEAR DG834G 54 Mbps Wireless ADSL Firewall DG834G DG834G User Manual

Wireless adsl2+ modem router
Hide thumbs Also See for DG834G 54 Mbps Wireless ADSL Firewall DG834G DG834G:
Table of Contents

Advertisement

This chapter describes how to use the virtual private networking (VPN) features of the ADSL2+
Modem Wireless Router. VPN communications paths are called tunnels. VPN tunnels provide
secure, encrypted communications between your local network and a remote network or computer.
See
"Virtual Private Networking (VPN)" in Appendix C
This chapter is organized as follows:
"Overview of VPN Configuration" on page 6-1
common VPN configurations: client-to-gateway and gateway-to-gateway.
"Planning a VPN" on page 6-3
parameters of the VPN you want to set up, along with the VPN Committee (VPNC)
recommended default parameters set by the VPN Wizard.
tunnel: VPN Wizard (recommended for most situations), Auto Policy, and Manual Policy.
to configure a VPN tunnel between a remote PC and a network gateway using the VPN
Wizard and the NETGEAR ProSafe VPN Client.
needed to configure a VPN tunnel between two network gateways using the VPN Wizard.
"VPN Tunnel Control" on page 6-25
verifying, deactivating, and deleting a VPN tunnel once the VPN tunnel has been configured.
"Setting Up VPN Tunnels in Special Circumstances" on page 6-32
to configure VPN tunnels when there are special circumstances and the VPNC recommended
defaults of the VPN Wizard are inappropriate. The two alternatives for configuring VPN
tunnels are Auto Policy and Manual Policy.

Overview of VPN Configuration

Two common scenarios for configuring VPN tunnels are between a remote PC and a network
gateway; and between two or more network gateways. The DG834Gv5 supports both of these
types of VPN configurations. The DG834Gv5 supports up to five concurrent tunnels.

Virtual Private Networking

to learn more about VPN.
provides an overview of the two most
provides a worksheet for recording the configuration
summarizes the three ways to configure a VPN
provides the step-by-step procedures for activating,
v1.0, May 2008
Chapter 6
provides the steps needed
provides the steps
provides the steps needed
6-1

Advertisement

Table of Contents
loading

Table of Contents