NETGEAR UTM5 Reference Manual page 283

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Figure 173.
Each policy contains the data that are explained in the following table. These fields are
explained in more detail in
Table 68. List of VPN Policies table information
Setting
Description
! (Status)
Indicates whether the policy is enabled (green circle) or disabled (gray circle). To enable
or disable a policy, select the check box adjacent to the circle, and click the Enable or
Disable table button, as appropriate.
Name
The name that identifies the VPN policy. When you use the VPN Wizard to create a VPN
policy, the name of the VPN policy (and of the automatically created accompanying IKE
policy) is the connection name.
Type
Auto or Manual as described previously (Auto is used during VPN Wizard configuration).
Local
IP address (either a single address, range of address, or subnet address) on your LAN.
Traffic needs to be from (or to) these addresses to be covered by this policy. (The subnet
address is supplied as the default IP address when you are using the VPN Wizard.)
Remote
IP address or address range of the remote network. Traffic needs to be to (or from) these
addresses to be covered by this policy. (The VPN Wizard default requires the remote
LAN IP address and subnet mask.)
Auth
The authentication algorithm that is used for the VPN tunnel. This setting needs to match
the setting on the remote endpoint.
Encr
The encryption algorithm that is used for the VPN tunnel. This setting needs to match the
setting on the remote endpoint.
Virtual Private Networking Using IPSec Connections
Table 69
on page 286.
283

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents