Netgear DGND3300v2 User Manual - Page 101

Using Auto Policy to Con VPN Tunnels, Configuring VPN Network Connection Parameters

Page 101 highlights

N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual • Manual Policy. For a manual keying setup in which you must specify each phase of the connection, see Using Manual Policy to Configure VPN Tunnels on page 109. Manual policy does not use IKE. Rather, you manually enter all the authentication and key parameters. You have more control over the process; however, the process is more complex, and there are more opportunities for errors or configuration mismatches between your N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 and the corresponding VPN endpoint gateway or client workstation. Using Auto Policy to Configure VPN Tunnels You need to configure matching VPN settings on both VPN endpoints. The outbound VPN settings on one end must match to the inbound VPN settings on other end, and vice versa. For an example of using Auto Policy, see Example of Using Auto Policy on page 106. Configuring VPN Network Connection Parameters All VPN tunnels on the N300 wireless modem router require that you configure several network parameters. This section describes those parameters and how to access them. The most common configuration scenarios use IKE to manage the authentication and encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to automatically generate and update the required encryption parameters. Chapter 6. Virtual Private Networking | 101

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177

Chapter 6.
Virtual Private Networking
|
101
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual
Manual Policy
. For a manual keying setup in which you must specify each phase of the
connection, see
Using Manual Policy to Configure VPN Tunnels
on page
109. Manual
policy does not use IKE. Rather, you manually enter all the authentication and key
parameters. You have more control over the process; however, the process is more
complex, and there are more opportunities for errors or configuration mismatches
between your N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 and the
corresponding VPN endpoint gateway or client workstation.
Using Auto Policy to Configure VPN Tunnels
You need to configure matching VPN settings on both VPN endpoints. The outbound VPN
settings on one end must match to the inbound VPN settings on other end, and vice versa.
For an example of using Auto Policy, see
Example of Using Auto Policy
on page
106.
Configuring VPN Network Connection Parameters
All VPN tunnels on the N300 wireless modem router require that you configure several
network parameters. This section describes those parameters and how to access them.
The most common configuration scenarios use IKE to manage the authentication and
encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to
automatically generate and update the required encryption parameters.