Netgear FVS318N FVS318 Reference Manual - Page 66

Understanding How FVS318 VPN Tunnels Are Con d, Connection., Security Association SA. - cannot open tunnel

Page 66 highlights

Reference Manual for the Model FVS318 Broadband ProSafe VPN Firewall VPN client access allows a remote PC to connect to your network from any location on the Internet. In this case, the remote PC is one tunnel endpoint, running VPN client software. The FVS318 VPN Firewall router on your network is the other tunnel endpoint • The FVS318 VPN Firewall supports up to eight concurrent tunnels. These scenarios are described below. Note: The FVS318 VPN Firewall uses industry standard VPN protocols. However, due to variations in how manufacturers interpret these standards, many VPN products do not interoperate. NETGEAR provides support for connections between NETGEAR VPN Firewalls, and between an FVS318 VPN Firewall and the SafeNet SoftRemote VPN Client for Windows. This manual is written based on tests with the FVS318 and versions 8 and 9 of the SafeNet client. Although the FVS318 can interoperate with many other VPN products, it is not possible for NETGEAR to provide specific technical support for every other interconnection. Please see NETGEAR's web site for additional VPN information. Understanding How FVS318 VPN Tunnels Are Configured You create VPN tunnels definitions via the VPN Settings link under the Setup section of the main menu on the FVS318. The VPN tunnel configuration consists of these two kinds of information: • Connection. Identifies the VPN endpoints by IPSec ID, IP address, or a fully qualified domain name (FQDN). Note: A FQDN is the complete URL of the router. Using a dynamic DNS service for a FVS318 with a dynamically-assigned IP address enables that FVS318 to both initiate and respond to requests to open a VPN tunnel. Otherwise, a FVS318 with a dynamically-assigned IP address can only initiate a request to open a VPN tunnel because no other initiators can know its IP address. • Security Association (SA). There are three kinds of SA key exchange modes: - IKE Main Mode: Uses the Internet Key Exchange (IKE) protocol to define the authentication scheme and automatically generate the encryption keys. Main Mode authentication is slightly slower than Aggressive Mode but more secure. - IKE Aggressive Mode: Uses the IKE protocol to define the authentication scheme and automatically generate the encryption keys. Aggressive Mode authentication is slightly faster than Main Mode but less secure. 6-2 Virtual Private Networking M-10146-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222

Reference Manual for the Model FVS318 Broadband
ProSafe VPN Firewall
6-2
Virtual Private Networking
M-10146-01
VPN client access allows a remote PC to connect to your network from any location on the
Internet. In this case, the remote PC is one tunnel endpoint, running VPN client software. The
FVS318 VPN Firewall router on your network is the other tunnel endpoint
The FVS318 VPN Firewall supports up to eight concurrent tunnels.
These scenarios are described below.
Understanding How FVS318 VPN Tunnels Are Configured
You create VPN tunnels definitions via the VPN Settings link under the Setup section of the main
menu on the FVS318. The VPN tunnel configuration consists of these two kinds of information:
Connection.
Identifies the VPN endpoints by IPSec ID, IP address, or a fully qualified domain
name (FQDN).
Note:
A FQDN is the complete URL of the router. Using a dynamic DNS service for a
FVS318 with a dynamically-assigned IP address enables that FVS318 to both initiate and
respond to requests to open a VPN tunnel. Otherwise, a FVS318 with a dynamically-assigned
IP address can only initiate a request to open a VPN tunnel because no other initiators can
know its IP address.
Security Association (SA).
There are three kinds of SA key exchange modes:
IKE Main Mode
: Uses the Internet Key Exchange (IKE) protocol to define the
authentication scheme and automatically generate the encryption keys. Main Mode
authentication is slightly slower than Aggressive Mode but more secure.
IKE Aggressive Mode
: Uses the IKE protocol to define the authentication scheme and
automatically generate the encryption keys. Aggressive Mode authentication is slightly
faster than Main Mode but less secure.
Note:
The FVS318 VPN Firewall uses industry standard VPN protocols. However, due
to variations in how manufacturers interpret these standards, many VPN products do not
interoperate. NETGEAR provides support for connections between NETGEAR VPN
Firewalls, and between an FVS318 VPN Firewall and the SafeNet SoftRemote VPN
Client for Windows. This manual is written based on tests with the FVS318 and versions
8 and 9 of the SafeNet client. Although the FVS318 can interoperate with many other
VPN products, it is not possible for NETGEAR to provide specific technical support for
every other interconnection. Please see NETGEAR's web site for additional VPN
information.