Walk-Through of Configuration Scenarios
There are a variety of configurations you might implement with the FVL328. The scenarios listed
below illustrate typical configurations you might use in your organization.
In order to help make it easier to set up an IPsec system, the following two scenarios are provided.
These scenarios were developed by the VPN Consortium (http://www.vpnc.org). The goal is to
make it easier to get the systems from different vendors to interoperate. NETGEAR is providing
you with both of these scenarios in the following two formats:
•
VPN Consortium Scenarios without any product implementation details
•
VPN Consortium Scenarios based on the FVL328 user interface
The purpose of providing these two versions of the same scenarios is to help you determine where
the two vendors use different vocabulary. Seeing the examples presented in these different ways
will reveal how systems from different vendors do the same thing. See
Private
Networking" for a full discussion of VPN and the configuration templates NETGEAR
developed for publishing multi-vendor VPN integration configuration case studies.
Note: See
Appendix F, "NETGEAR VPN Configuration FVS318 or FVM318 to
FVL328
for a detailed procedure for configuring VPN communications between a
NETGEAR FVS318 and a FVL328. NETGEAR publishes additional interoperability
scenarios with various gateway and client software products. Look on the NETGEAR
Web site at
www.netgear.com/docs
VPNC Scenario 1: Gateway-to-Gateway with Preshared Secrets
The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication.
10.5.6.0/24
Gateway A
10.5.6.1
Figure 6-5: VPN Consortium Scenario 1
Virtual Private Networking
Model FVL328 ProSafe High-Speed VPN Firewall Reference Manual
for more details.
Internet
14.15.16.17
M-10144-01
172.23.9.0/24
Gateway B
22.23.24.25
172.23.9.1
Appendix E, "Virtual
6-15