NETGEAR ProSafe FVS318N Reference Manual page 249

Prosafe wireless-n 8-port gigabit vpn firewall
Hide thumbs Also See for ProSafe FVS318N:
Table of Contents

Advertisement

ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Note:
The IKE policy settings that are explained in the following table are
specifically for a Mode Config configuration.
explains the general IKE policy settings.
Table 58. Add IKE Policy screen settings for a Mode Config configuration
Setting
Description
Mode Config Record
Do you want to use
Select the Yes radio button.
Mode Config Record?
Note:
radio button sets the tunnel exchange mode to Aggressive mode. Mode Config
also requires that both the local and remote endpoints are defined by their FQDNs.
Select Mode
Config Record
General
Policy Name
A descriptive name of the IKE policy for identification and management purposes.
This example uses ModeConfigNA_Sales.
Note:
Direction / Type
Responder is automatically selected when you select the Mode Config record in
the Mode Config Record section of the screen. This ensures that the wireless VPN
firewall responds to an IKE request from the remote endpoint but does not initiate
one.
Exchange Mode
Aggressive mode is automatically selected when you select the Mode Config
record in the Mode Config Record section of the screen.
Local
Identifier Type
From the drop-down list, select FQDN.
Note:
endpoint) is defined by an FQDN.
Identifier
Remote
Identifier Type
From the drop-down list, select FQDN.
Note:
Identifier
Virtual Private Networking Using IPSec and L2TP Connections
Because Mode Config functions only in Aggressive mode, selecting the Yes
From the drop-down list, select the Mode Config record that
you created in
Sales.
The name is not supplied to the remote VPN endpoint.
Mode Config requires that the wireless VPN firewall (that is, the local
Enter an FQDN for the wireless VPN firewall. This example
uses router.com.
Mode Config requires that the remote endpoint is defined by an FQDN.
Enter the FQDN for the remote endpoint. This needs to be an
FQDN that is not used in any other IKE policy. This example
uses client.com.
249
Table 52
on page 226
Step 4
on page 247. This example uses NA

Advertisement

Table of Contents
loading

Table of Contents