Configure Netbios Bridging With Ipsec Vpn - NETGEAR FVS318G Reference Manual

Vpn firewall
Hide thumbs Also See for FVS318G:
Table of Contents

Advertisement

5.
In the IKE SA Parameters section, locate the DPD fields, and complete the settings as
described the following table.
Table 62. Dead Peer Detection settings
Setting
IKE SA Parameters
Enable Dead Peer
Detection
6.
Click the Apply button.
Your changes are saved.

Configure NetBIOS Bridging with IPSec VPN

Windows networks use the Network Basic Input/Output System (NetBIOS) for several basic
network services such as naming and neighborhood device discovery. Because VPN routers
do not usually pass NetBIOS traffic, these network services do not function for hosts on
opposite ends of a VPN connection. To solve this problem, you can configure the VPN
firewall to bridge NetBIOS traffic over the VPN tunnel.
To enable NetBIOS bridging on a configured VPN tunnel:
1.
Log in to the unit:
a. In the address field of any of the qualified web browsers, enter https://192.168.1.1.
The NETGEAR Configuration Manager Login screen displays.
b. In the Username field, enter admin and in the Password / Passcode field, enter
password.
Use lowercase letters. If you changed the password, enter your personalized
password. Leave the domain as it is (geardomain).
c. Click the Login button.
The Router Status screen displays. After five minutes of inactivity, which is the default
login time-out, you are automatically logged out.
2.
Select VPN > IPSec VPN > VPN Policies.
Virtual Private Networking Using IPSec and L2TP Connections
NETGEAR ProSAFE VPN Firewall FVS318G v2
Description
Select the Yes radio button to enable DPD. When the VPN firewall detects an
IKE connection failure, it deletes the IPSec and IKE SA and forces a
reestablishment of the connection. You must specify the detection period in the
Detection Period field and the maximum number of times that the VPN firewall
attempts to reconnect in the Reconnect after failure count field.
Detection Period
The period in seconds between consecutive
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle. The default setting is 10 seconds.
Reconnect after
The maximum number of DPD failures before the VPN
failure count
firewall tears down the connection and then attempts to
reconnect to the peer. The default setting is 3 failures.
280

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosafe fvs318g v2

Table of Contents