Configure The Prosafe Vpn Client For Mode Config Operation - NETGEAR ProSafe FVS318N Reference Manual

Wireless-n 8-port gigabit vpn firewall
Hide thumbs Also See for ProSafe FVS318N:
Table of Contents

Advertisement

ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Table 57. Add IKE Policy screen settings for a Mode Config configuration (continued)
Setting
Extended Authentication
XAUTH Configuration
Note:
For more
information about
XAUTH and its
authentication
modes, see
Configure
XAUTH for VPN
Clients
on page 234.
9.
Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.

Configure the ProSafe VPN Client for Mode Config Operation

When the Mode Config feature is enabled, the following information is negotiated between
the VPN client and the wireless VPN firewall during the authentication phase:
Virtual IP address of the VPN client
DNS server address (optional)
WINS server address (optional)
The virtual IP address that is issued by the wireless VPN firewall is displayed in the VPN
Client Address field on the VPN client's IPSec pane.
Virtual Private Networking Using IPSec and L2TP Connections
Description
Select one of the following radio buttons to specify whether or not Extended
Authentication (XAUTH) is enabled, and, if enabled, which device is used to verify
user account information:
• None. XAUTH is disabled. This the default setting.
• Edge Device. The wireless VPN firewall functions as a VPN concentrator on
which one or more gateway tunnels terminate. The authentication modes that
are available for this configuration are User Database, RADIUS PAP, and
RADIUS CHAP.
• IPSec Host. The wireless VPN firewall functions as a VPN client of the remote
gateway. In this configuration the wireless VPN firewall is authenticated by a
remote gateway with a user name and password combination.
Authentication
For an Edge Device configuration, from the drop-down list,
Type
select one of the following authentication types:
• User Database. XAUTH occurs through the wireless VPN
firewall's user database. You can add users on the Add User
screen (see
• Radius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the wireless VPN firewall connects to a
RADIUS server. For more information, see
and Server Configuration
• Radius CHAP. XAUTH occurs through RADIUS Challenge
Handshake Authentication Protocol (CHAP). For more
information, see
page 235.
Username
The user name for XAUTH.
Password
The password for XAUTH.
245
User Database Configuration
on page 235.
RADIUS Client and Server Configuration
on page 235).
RADIUS Client
on

Advertisement

Table of Contents
loading

Table of Contents