Netgear DG834Gv3 DG834Gv3 Reference Manual - Page 132

How to Set Up VPN Tunnels in Special Circumstances, Using Auto Policy to Con VPN Tunnels

Page 132 highlights

Reference Manual for the ADSL Modem Wireless Router DG834G How to Set Up VPN Tunnels in Special Circumstances When the VPN Wizard and its VPNC defaults (see Table 7-2) are not appropriate for your special circumstances, use one of the following alternatives: • Auto Policy-for a typical automated Internet Key Exchange (IKE) setup, see "Using Auto Policy to Configure VPN Tunnels" on page 7-38. Auto Policy uses the IKE protocol to define the authentication scheme and automatically generate the encryption keys. • Manual Policy-for a Manual Keying setup in which you must specify each phase of the connection, see "Using Manual Policy to Configure VPN Tunnels" on page 7-48. Manual Policy does not use IKE. Rather, you manually enter all the authentication and key parameters. You have more control over the process, however the process is more complex and there are more opportunities for errors or configuration mismatches between your DG834G v3 and the corresponding VPN endpoint gateway or client workstation. Using Auto Policy to Configure VPN Tunnels You need to configure matching VPN settings on both VPN endpoints. The outbound VPN settings on one end must match to the inbound VPN settings on other end, and vice versa. See "Example of Using Auto Policy" on page 7-43 for an example of using Auto Policy. Configuring VPN Network Connection Parameters All VPN tunnels on the ADSL Modem Wireless Router require configuring several network parameters. This section describes those parameters and how to access them. The most common configuration scenarios will use IKE to manage the authentication and encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to automatically generate and update the required encryption parameters. Click the VPN Policies link of the main menu, and then click the Add Auto Policy button to display the VPN - Auto Policy menu shown in Figure 7-40. 7-38 v1.0, January 2006 Virtual Private Networking

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

Reference Manual for the ADSL Modem Wireless Router DG834G
7-38
Virtual Private Networking
v1.0, January 2006
How to Set Up VPN Tunnels in Special Circumstances
When the VPN Wizard and its VPNC defaults (see
Table 7-2
) are not appropriate for your special
circumstances, use one of the following alternatives:
Auto Policy
—for a typical automated Internet Key Exchange (IKE) setup, see
“Using Auto
Policy to Configure VPN Tunnels” on page 7-38
. Auto Policy uses the IKE protocol to define
the authentication scheme and automatically generate the encryption keys.
Manual Policy
—for a Manual Keying setup in which you must specify each phase of the
connection, see
“Using Manual Policy to Configure VPN Tunnels” on page 7-48
. Manual
Policy does not use IKE. Rather, you manually enter all the authentication and key parameters.
You have more control over the process, however the process is more complex and there are
more opportunities for errors or configuration mismatches between your DG834G v3 and the
corresponding VPN endpoint gateway or client workstation.
Using Auto Policy to Configure VPN Tunnels
You need to configure matching VPN settings on both VPN endpoints. The outbound VPN
settings on one end must match to the inbound VPN settings on other end, and vice versa.
See
“Example of Using Auto Policy” on page 7-43
for an example of using Auto Policy.
Configuring VPN Network Connection Parameters
All VPN tunnels on the ADSL Modem Wireless Router require configuring several network
parameters. This section describes those parameters and how to access them.
The most common configuration scenarios will use IKE to manage the authentication and
encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to
automatically generate and update the required encryption parameters.
Click the
VPN Policies
link of the main menu, and then click the
Add Auto Policy
button to
display the VPN - Auto Policy menu shown in
Figure 7-40
.