Manage Vpn Policies - NETGEAR UTM9S Reference Manual

Prosecure unified threat management (utm) appliance
Hide thumbs Also See for UTM9S:
Table of Contents

Advertisement

Table 64. Add IKE Policy screen settings (continued)
Setting
Extended Authentication
XAUTH Configuration
Note:
For more
information about
XAUTH and its
authentication modes,
see
Configure XAUTH
for VPN Clients
page 277.
4.
Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.
To edit an IKE policy:
1.
Select VPN > IPSec VPN. The IPSec VPN submenu tabs display with the IKE Policies
screen in view (see
2.
In the List of IKE Policies table, click the Edit table button to the right of the IKE policy that
you want to edit. The Edit IKE Policy screen displays. This screen shows the same fields as
the Add IKE Policy screen (see
3.
Modify the settings that you wish to change (see the previous table).
4.
Click Apply to save your changes. The modified IKE policy is displayed in the List of IKE
Policies table.

Manage VPN Policies

You can create two types of VPN policies. When you use the VPN Wizard to create a VPN
policy, only the Auto method is available.
ProSecure Unified Threat Management (UTM) Appliance
Description
Select one of the following radio buttons to specify whether or not Extended
Authentication (XAUTH) is enabled, and, if enabled, which device is used to verify
user account information:
• None. XAUTH is disabled. This the default setting.
• Edge Device. The UTM functions as a VPN concentrator on which one or more
gateway tunnels terminate. The authentication modes that are available for this
configuration are User Database, RADIUS PAP, or RADIUS CHAP.
• IPSec Host. The UTM functions as a VPN client of the remote gateway. In this
on
configuration the UTM is authenticated by a remote gateway with a user name
and password combination.
Authentication
Type
Username
Password
Figure 164
on page 263).
Figure 165
Virtual Private Networking Using IPSec Connections
For an Edge Device configuration, from the drop-down list,
select one of the following authentication types:
• User Database. XAUTH occurs through the UTM's user
database. You can add users on the Add User screen (see
User Database Configuration
• Radius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the UTM connects to a RADIUS server. For
more information, see
RADIUS Client Configuration
page 279.
• Radius CHAP. XAUTH occurs through RADIUS Challenge
Handshake Authentication Protocol (CHAP). For more
information, see
RADIUS Client Configuration
The user name for XAUTH.
The password for XAUTH.
on page 265).
269
on page 278).
on
on page 279.

Advertisement

Table of Contents
loading

Table of Contents