Netgear FVS318G FVS318G User Manual - Page 111
Configuring the ProSafe VPN Client for ModeConfig, Edge Device, Authentication Type, IPsec Host - default login
UPC - 606449064827
View all Netgear FVS318G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 111 highlights
ProSafe Gigabit 8 Port VPN Firewall FVS318G Reference Manual 7. Enter a Pre-Shared Key that will also be configured in the VPN client. 8. XAUTH is disabled by default. To enable XAUTH, choose one of the following: • Edge Device to use this VPN firewall as a VPN concentrator where one or more gateway tunnels terminate. (If selected, you must specify the Authentication Type to be used in verifying credentials of the remote VPN gateways.) • IPsec Host if you want this gateway to be authenticated by the remote gateway. Enter a Username and Password to be associated with the IKE policy. When this option is chosen, you will need to specify the user name and password to be used in authenticating this gateway (by the remote gateway). For more information on XAUTH, see "Configuring XAUTH for VPN Clients" on page 5-18. 9. If Edge Device was enabled, choose the Authentication Type from the pull down menu which will be used to verify account information: User Database, RADIUS-CHAP or RADIUS-PAP. Users must be added through the User Database screen (see "Changing the Administrator Login" on page 6-2 or "RADIUS Client Configuration" on page 5-19). Note: If RADIUS-PAP is selected, the VPN firewall will first check the User Database to see if the user credentials are available. If the user account is not present, the VPN firewall will then connect to the RADIUS server. 10. Click Apply. The new policy will appear in the IKE Policies Table. Configuring the ProSafe VPN Client for ModeConfig From a client PC running NETGEAR ProSafe VPN Client software, configure the remote VPN client connection. To configure the client PC: 1. Right-click the VPN client icon in the Windows toolbar. In the upper left of the Policy Editor window, click the New Policy editor icon. a. Give the connection a descriptive name such as "modecfg_test". (This name will only be used internally). b. From the ID Type pull-down menu, choose IP Subnet. c. Enter the IP Subnet and Mask of the VPN firewall (this is the LAN network IP address of the gateway). d. Check the Connect using radio button and choose Secure Gateway Tunnel from the pulldown menu. Virtual Private Networking Using IPsec 1.1 November, 2009 5-25