NETGEAR ProSafe SRX5308 Reference Manual page 187

Gigabit quad wan ssl vpn firewall
Hide thumbs Also See for ProSafe SRX5308:
Table of Contents

Advertisement

7.
Specify the settings that are explained in the following table.
Table 46. VPN client advanced authentication settings (Mode Config)
Setting
Advanced features
Mode Config
Aggressive Mode
NAT-T
Local and Remote ID
Local ID
Remote ID
8.
Click Apply to use the new settings immediately, and click Save to keep the settings for
future use.
Create the Mode Config IPSec Configuration (Phase 2 Settings)
Note:
On the VPN firewall, the IPSec configuration (phase 2 settings) is
referred to as the IKE settings.
To create an IPSec configuration:
1.
In the tree list pane of the Configuration Panel screen, right-click the GW_ModeConfig
authentication phase name, and then select New Phase 2.
2.
Change the name of the IPSec configuration (the default is Tunnel):
a. Right-click the IPSec configuration name.
b. Select Rename.
c. Type Tunnel_ModeConfig.
d. Click anywhere in the tree list pane.
Note:
This is the name for the IPSec configuration that is used only for the
VPN client, not during IPSec negotiation. You can view and change this name
in the tree list pane. This name needs to be a unique name.
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
Description
Select this check box to enable Mode Config.
Select this check box to enable aggressive mode as the negotiation mode with
the VPN firewall.
Select Automatic from the drop-down list to enable the VPN client and VPN
firewall to negotiate NAT-T.
As the type of ID, select DNS from the Local ID drop-down list because you
specified FQDN in the VPN firewall configuration.
As the value of the ID, enter client.com as the local ID for the VPN client.
Note:
The remote ID on the VPN firewall is the local ID on the VPN client.
As the type of ID, select DNS from the Remote ID drop-down list because you
specified an FQDN in the VPN firewall configuration.
As the value of the ID, enter router.com as the remote ID for the VPN firewall.
Note:
The local ID on the VPN firewall is the remote ID on the VPN client.
Virtual Private Networking Using IPSec Connections
187

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents