NETGEAR FVM318 Reference Manual page 63

Cable/dsl prosafe wireless vpn security firewall
Hide thumbs Also See for FVM318:
Table of Contents

Advertisement

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
Enter the Remote Gateway IP Address which is the WAN IP Address for the second
FVS318 (B). In this example, use 10.0.0.1 for the Gateway IP Address.
You can look up the Remote Gateway IP Address by viewing the WAN Status screen
of the second FVS318 (B). When FVS318 (B) is connected to the Internet, log in, go
go to its Maintenance menu Router Status link. If you find the WAN Port DHCP field
says "DHCP Client" or "PPPOE," then it is a dynamic address. For a dynamic address
enter 0.0.0.0 in the configuration screen of the FVS318 on LAN A as the WAN IP
Address for the FVS318 on LAN (B).
Note: Only one side may have a dynamic IP address, and that side must always
initiate the connection.
Under Secure Association, select Main Mode, unless you are connecting to a device that
e.
requires Aggressive Mode, and fill in the settings below.
Note: The alternative to IKE is Manual Keying which is covered
as an Alternative to IKE" on page
To configure the IKE settings for firewall A, enter the following:
Enable Perfect Forward Secrecy.
For Encryption Protocol, select: DES.
Enter the PreShared Key. In this example, r>T(h4&3@#kB is the PreShared Key.
With IKE, a preshared key that you make up is used for mutual identification. The
PreShared Key should be between 8 and 80 characters, and the letters are case
sensitive. Entering a combination of letters, numbers and symbols, such as
r>T(h4&3@#kB provides greater security.
Key Life - Default is 3600 seconds (1 hour)
IKE Life Time - Default is 28800 seconds (8 hours).
A shorter time increases security, but users will be temporarily disconnected upon
renegotiation.
If you need to run Microsoft networking functions such as Network Neighborhood, click
f.
the NETBIOS Enable check box to allow NETBIOS traffic over the VPN tunnel.
Click Apply to save the Security Association tunnel settings into the table.
g.
4-8
4-24.
"Using Manual Keying
Virtual Private Networking

Advertisement

Table of Contents
loading

Table of Contents