Advanced Virtual Private Networking; Using Ike And Vpn Policies To Manage Vpn Traffic - NETGEAR FVG318 Reference Manual

Prosafe 802.11g wireless vpn firewall
Hide thumbs Also See for FVG318:
Table of Contents

Advertisement

This chapter describes how to use the advanced virtual private networking (VPN) features of the
VPN firewall. See
Chapter 5, "Basic Virtual Private
the basic VPN features.
The FVG318 uses state-of-the-art firewall and security technology to facilitate controlled and
actively monitored VPN connectivity. Since the FVG318 strictly conforms to IETF standards, it is
interoperable with devices from major network equipment vendors.
FVG318 VPN Firewall
Figure 6-1

Using IKE and VPN Policies to Manage VPN Traffic

You create policy definitions to manage VPN traffic on the FVG318. There are two kinds of
policies:
IKE Policies. Define the authentication scheme and automatically generate the encryption
keys. As an alternative option, to further automate the process, you can create an IKE policy
that uses a trusted certificate authority to provide the authentication while the IKE policy still
handles the encryption.

Advanced Virtual Private Networking

Advanced Virtual Private Networking
v1.0, September 2007
Networking" for a description on how to use
FVG318 VPN Firewall
Chapter 6
6-1

Advertisement

Table of Contents
loading

Table of Contents