Netgear FVG318v1 FVG318 Reference Manual - Page 79

Basic Virtual Private Networking

Page 79 highlights

Chapter 5 Basic Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the VPN firewall. VPN communications paths are called tunnels. VPN tunnels provide secure, encrypted communications between your local network and a remote network or computer. The VPN information is organized as follows: • "Overview of VPN Configuration" on page 5-2 provides an overview of the two most common VPN configurations: client-to-gateway and gateway-to-gateway. • "Planning a VPN" on page 5-3 provides the VPN Committee (VPNC) recommended default parameters set by the VPN Wizard. • "VPN Tunnel Configuration" on page 5-4 summarizes the two ways to configure a VPN tunnel: VPN Wizard (recommended for most situations) and Advanced (see Chapter 6, "Advanced Virtual Private Networking). • "Setting Up a Client-to-Gateway VPN Configuration" on page 5-5 provides the steps needed to configure a VPN tunnel between a remote PC and a network gateway using the VPN Wizard and the NETGEAR ProSafe VPN Client. • "Setting Up a Gateway-to-Gateway VPN Configuration" on page 5-19 provides the steps needed to configure a VPN tunnel between two network gateways using the VPN Wizard. • "Activating a VPN Tunnel" on page 5-23 provides the step-by-step procedures for activating, verifying, deactivating, and deleting a VPN tunnel once the VPN tunnel has been configured. • Chapter 6, "Advanced Virtual Private Networking" provides the steps needed to configure VPN tunnels when there are special circumstances and the VPNC recommended defaults of the VPN Wizard are inappropriate. • Appendix B, "Related Documents" has a link to "Virtual Private Networking (VPN)" which discusses Virtual Private Networking (VPN) Internet Protocol security (IPSec). IPSec is one of the most complete, secure, and commercially available, standards-based protocols developed for transporting data. • Appendix C, "VPN Configuration of NETGEAR FVG318" presents a case study on how to configure a secure IPSec VPN tunnel from a NETGEAR FVG318 to a FVL328. This case study follows the VPN Consortium interoperability profile guidelines (found at http://www.vpnc.org/InteropProfiles/Interop-01.html). Basic Virtual Private Networking 5-1 v1.0, September 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

Basic Virtual Private Networking
5-1
v1.0, September 2007
Chapter 5
Basic Virtual Private Networking
This chapter describes how to use the virtual private networking (VPN) features of the VPN
firewall. VPN communications paths are called tunnels. VPN tunnels provide secure, encrypted
communications between your local network and a remote network or computer.
The VPN information is organized as follows:
“Overview of VPN Configuration” on page 5-2
provides an overview of the two most
common VPN configurations: client-to-gateway and gateway-to-gateway.
“Planning a VPN” on page 5-3
provides the VPN Committee (VPNC) recommended default
parameters set by the VPN Wizard.
“VPN Tunnel Configuration” on page 5-4
summarizes the two ways to configure a VPN
tunnel: VPN Wizard (recommended for most situations) and Advanced (see
Chapter 6,
“Advanced Virtual Private Networking
).
“Setting Up a Client-to-Gateway VPN Configuration” on page 5-5
provides the steps needed
to configure a VPN tunnel between a remote PC and a network gateway using the VPN
Wizard and the NETGEAR ProSafe VPN Client.
“Setting Up a Gateway-to-Gateway VPN Configuration” on page 5-19
provides the steps
needed to configure a VPN tunnel between two network gateways using the VPN Wizard.
“Activating a VPN Tunnel” on page 5-23
provides the step-by-step procedures for activating,
verifying, deactivating, and deleting a VPN tunnel once the VPN tunnel has been configured.
Chapter 6, “Advanced Virtual Private Networking
” provides the steps needed to configure
VPN tunnels when there are special circumstances and the VPNC recommended defaults of
the VPN Wizard are inappropriate.
Appendix B, “Related Documents
” has a link to
“Virtual Private Networking (VPN)
” which
discusses Virtual Private Networking (VPN) Internet Protocol security (IPSec). IPSec is one of
the most complete, secure, and commercially available, standards-based protocols developed
for transporting data.
Appendix C, “VPN Configuration of NETGEAR FVG318
” presents a case study on how to
configure a secure IPSec VPN tunnel from a NETGEAR FVG318 to a FVL328. This case
study follows the VPN Consortium interoperability profile guidelines (found at
).