Basic Virtual Private Networking - NETGEAR FVG318 Reference Manual

Prosafe 802.11g wireless vpn firewall
Hide thumbs Also See for FVG318:
Table of Contents

Advertisement

This chapter describes how to use the virtual private networking (VPN) features of the VPN
firewall. VPN communications paths are called tunnels. VPN tunnels provide secure, encrypted
communications between your local network and a remote network or computer.
The VPN information is organized as follows:
common VPN configurations: client-to-gateway and gateway-to-gateway.
"Planning a VPN" on page 5-3
parameters set by the VPN Wizard.
tunnel: VPN Wizard (recommended for most situations) and Advanced (see
to configure a VPN tunnel between a remote PC and a network gateway using the VPN
Wizard and the NETGEAR ProSafe VPN Client.
needed to configure a VPN tunnel between two network gateways using the VPN Wizard.
verifying, deactivating, and deleting a VPN tunnel once the VPN tunnel has been configured.
Chapter 6, "Advanced Virtual Private
VPN tunnels when there are special circumstances and the VPNC recommended defaults of
the VPN Wizard are inappropriate.
Appendix B, "Related
discusses Virtual Private Networking (VPN) Internet Protocol security (IPSec). IPSec is one of
the most complete, secure, and commercially available, standards-based protocols developed
for transporting data.
Appendix C, "VPN Configuration of NETGEAR
configure a secure IPSec VPN tunnel from a NETGEAR FVG318 to a FVL328. This case
study follows the VPN Consortium interoperability profile guidelines (found at
http://www.vpnc.org/InteropProfiles/Interop-01.html).

Basic Virtual Private Networking

Basic Virtual Private Networking
provides the VPN Committee (VPNC) recommended default
summarizes the two ways to configure a VPN
Networking).
provides the step-by-step procedures for activating,
Networking" provides the steps needed to configure
Documents" has a link to
v1.0, September 2007
provides an overview of the two most
provides the steps needed
"Virtual Private Networking
FVG318" presents a case study on how to
Chapter 5
Chapter 6,
provides the steps
(VPN)" which
5-1

Advertisement

Table of Contents
loading

Table of Contents