Netgear FVS318 FVS318v3 Reference Manual - Page 95
Table 6-1., VPN - Auto Policy Configuration Fields
UPC - 606449023381
View all Netgear FVS318 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 95 highlights
Reference Manual for the ProSafe VPN Firewall FVS318v3 The VPN - Auto Policy fields are defined in the following table. Table 6-1. VPN - Auto Policy Configuration Fields Field General Policy Name IKE Policy Remote VPN Endpoint Address Type Address Data SA Life Time IPSec PFS PFS Key Group Description These settings identify this policy and determine its major characteristics. The descriptive name of the VPN policy. Each policy should have a unique policy name. This name is not supplied to the remote VPN endpoint. It is only used to help you identify VPN policies. The existing IKE policies are presented in a drop-down list. Note: Create the IKE policy BEFORE creating a VPN - Auto policy. The address used to locate the remote VPN firewall or client to which you wish to connect. The remote VPN endpoint must have this FVS318v3's Local IP values entered as its Remote VPN Endpoint. • By its Fully Qualified Domain Name (FQDN) - your domain name. • By its IP Address. The address type used to locate the remote VPN firewall or client to which you wish to connect. • By its Fully Qualified Domain Name (FQDN) - your domain name. • By its IP Address. The address used to locate the remote VPN firewall or client to which you wish to connect. The remote VPN endpoint must have this FVS318v3's Local Identity Data entered as its Remote VPN Endpoint. • By its Fully Qualified Domain Name (FQDN) - your domain name. • By its IP Address. The duration of the Security Association before it expires. • Seconds - the amount of time before the SA expires. Over an hour is common (3600). • Kbytes - the amount of traffic before the SA expires. One of these can be set without setting the other. If enabled, security is enhanced by ensuring that the key is changed at regular intervals. Also, even if one key is broken, subsequent keys are no easier to break. Each key has no relationship to the previous key. If PFS is enabled, this setting determines the DH group bit size used in the key exchange. This must match the value used on the remote gateway. Advanced Virtual Private Networking 6-7 January 2005