NETGEAR SRX5308 - ProSafe® Quad WAN Gigabit SSL VPN Firewall Reference Manual page 170

Gigabit quad wan ssl vpn firewall
Hide thumbs Also See for SRX5308 - ProSafe® Quad WAN Gigabit SSL VPN Firewall:
Table of Contents

Advertisement

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
Table 5-10. Add IKE Policy Settings (continued)
Item
Extended Authentication
XAUTH Configuration
Note: For more
information about
XAUTH and its
authentication modes,
see
"Configuring
XAUTH for VPN
Clients" on page
5-38.
4. Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.
To edit an IKE policy:
1. Select VPN > IPSec VPN from the menu. The IPsec VPN submenu tabs display, with the IKE
Policies screen in view (see
2. In the List of IKE Policies table, click the Edit table button to the right of the IKE policy that
you want to edit. The Edit IKE Policy screen displays. This screen shows the same field as the
Add IKE Policy screen (see
5-28
Description (or Subfield and Description)
Select one of the following radio buttons to specify whether or not Extended
Authentication (XAUTH) is enabled, and–if enabled–which device is used to
verify user account information:
• None. XAUTH is disabled. This the default setting.
• Edge Device. The VPN firewall functions as a VPN concentrator on which
one or more gateway tunnels terminate. The authentication modes that are
available for this configuration are User Database, RADIUS PAP, or RADIUS
CHAP.
• IPSec Host. The VPN firewall functions as a VPN client of the remote
gateway. In this configuration the VPN firewall is authenticated by a remote
gateway with a user name and password combination.
Authentication
For an Edge Device configuration: from the drop-down list,
Type
select one of the following authentication types:
• User Database. XAUTH occurs through the VPN
firewall's user database. Users must be added through
the Add User screen (see
on page
• Radius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database
is first checked. If the user account is not present in the
local user database, the VPN firewall connects to a
RADIUS server. For more information, see
Client Configuration" on page
• Radius CHAP. XAUTH occurs through RADIUS
Challenge Handshake Authentication Protocol (CHAP).
For more information, see
on page
Username
The user name for XAUTH.
Password
The password for XAUTH.
Figure 5-20 on page
Figure 5-21 on page
Virtual Private Networking Using IPsec Connections
v1.0, April 2010
"User Database Configuration"
5-39).
5-39.
"RADIUS Client Configuration"
5-39.
5-22).
5-24).
"RADIUS

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosafe srx5308

Table of Contents