NETGEAR UTM5EW-100NAS Appliance Reference Manual page 244

Unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance Reference Manual
2. Click the VPN Policies submenu tab. The VPN Policies screen displays.
some examples.)
Figure 7-22
Each policy contains the data that are explained in
more detail in
Table 7-12 on page
Table 7-11. List of VPN Policies Information
Item
! (Status)
Name
Type
Local
Remote
Auth
Encr
7-32
7-35.
Description (or Subfield and Description)
Indicates whether the policy is enabled (green circle) or disabled (grey circle). To
enable or disable a policy, select the checkbox adjacent to the circle and click
the Enable or Disable table button, as required.
The name that identifies the VPN policy. When you use the VPN Wizard to
create a VPN policy, the name of the VPN policy (and of the automatically
created accompanying IKE policy) is the Connection Name.
"Auto" or "Manual" as described previously (Auto is used during VPN Wizard
configuration).
IP address (either a single address, range of address or subnet address) on your
local LAN. Traffic must be from (or to) these addresses to be covered by this
policy. (The subnet address is supplied as the default IP address when using the
VPN Wizard).
IP address or address range of the remote network. Traffic must be to (or from)
these addresses to be covered by this policy. (The VPN Wizard default requires
the remote LAN IP address and subnet mask).
The authentication algorithm that is used for the VPN tunnel. This setting must
match the setting on the remote endpoint.
The encryption algorithm that is used for the VPN tunnel. This setting must
match the setting on the remote endpoint.
Virtual Private Networking Using IPsec Connections
v1.0, January 2010
Table
7-11. These fields are explained in
(Figure 7-22
shows

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents