Configuring Vpn Policies - NETGEAR FVS336Gv1 - ProSafe Dual WAN Gigabit Firewall Reference Manual

Dual wan gigabit firewall with ssl & ipsec vpn
Hide thumbs Also See for FVS336Gv1 - ProSafe Dual WAN Gigabit Firewall:
Table of Contents

Advertisement

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
DH. The Diffie-Hellman (DH) group used when exchanging keys. The DH group sets the
number of bits. The VPN Wizard default setting is Group 2. (This setting must match the
remote VPN.)
To gain a more complete understanding of the encryption, authentication and DH algorithm
technologies, see
Appendix D, "Related

Configuring VPN Policies

You can create two types of VPN policies. When using the VPN Wizard to create a VPN policy,
only the Auto method is available.
Manual. All settings (including the keys) for the VPN tunnel are manually entered at each end
(both VPN Endpoints). No third-party server or organization is involved.
Auto. Some parameters for the VPN tunnel are generated automatically by using the IKE
(Internet Key Exchange) protocol to perform negotiations between the two VPN Endpoints
(the Local ID Endpoint and the Remote ID Endpoint).
In addition, a Certificate Authority (CA) can also be used to perform authentication (see
"Managing Certificates" on page
from the CA. For each certificate, there is both a public key and a private key. The public key is
freely distributed, and is used by any sender to encrypt data intended for the receiver (the key
owner). The receiver then uses its private key to decrypt the data (without the private key,
decryption is impossible). The use of certificates for authentication reduces the amount of data
entry required on each VPN endpoint.
The VPN Policies Screen
The VPN Policies screen (see
either Auto or Manual—and to manage the VPN policies already created. You can edit policies,
enable or disable policies, or delete them entirely. The rules for VPN policy use are:
1. Traffic covered by a policy will automatically be sent via a VPN tunnel.
2. When traffic is covered by two or more policies, the first matching policy will be used. (In this
situation, the order of the policies is important. However, if you have only one policy for each
remote VPN Endpoint, then the policy order is not important.)
3. The VPN tunnel is created according to the parameters in the SA (Security Association).
4. The remote VPN endpoint must have a matching SA, or it will refuse the connection.
5-18
Documents" for a link to the NETGEAR website.
7-11). To use a CA, each VPN gateway must have a certificate
Figure 5-9 on page
5-8) allows you to add additional policies—
v1.0, January 2010
Virtual Private Networking Using IPsec

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosafe fvs336g

Table of Contents