Netgear FVS336G FVS336G Reference Manual - Page 87

Virtual Private Networking Using IPsec, Considerations for Dual WAN Port Systems - bridge

Page 87 highlights

Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide secure, encrypted communications between your local network and a remote network or computer. This chapter contains the following sections: • "Considerations for Dual WAN Port Systems" on page 5-1 • "Using the VPN Wizard for Client and Gateway Configurations" on page 5-3 • "Testing the Connections and Viewing Status Information" on page 5-12 • "Managing VPN Policies" on page 5-15 • "Configuring Extended Authentication (XAUTH)" on page 5-18 • "Assigning IP Addresses to Remote Users (ModeConfig)" on page 5-22 • "Configuring Keepalives and Dead Peer Detection" on page 5-28 • "Configuring NetBIOS Bridging with VPN" on page 5-30 Considerations for Dual WAN Port Systems If both of the WAN ports of the VPN firewall are configured, you can enable either Auto-Rollover mode for increased system reliability or Load Balancing mode for optimum bandwidth efficiency. This WAN mode choice impacts how the VPN features must be configured. The use of fully qualified domain names in VPN policies is mandatory when the WAN ports are in load balancing or rollover mode; and is also required for the VPN tunnels to fail over. FQDN is optional when the WAN ports are in load balancing mode if the IP addresses are static but mandatory if the WAN IP addresses are dynamic. Refer to "Virtual Private Networks (VPNs)" on page C-10 for more on the IP addressing requirements for VPN in the dual WAN modes. For instructions on how to select and configure a dynamic DNS service for resolving FQDNs, see "Configuring Dynamic DNS (Optional)" on page 2-16. For instructions on WAN mode configuration, see "Configuring the WAN Mode (Required for Dual WAN)" on page 2-10. 5-1 v1.0, March 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241

5-1
v1.0, March 2009
Chapter 5
Virtual Private Networking Using IPsec
This chapter describes how to use the IPsec virtual private networking (VPN) features of the
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide secure, encrypted
communications between your local network and a remote network or computer.
This chapter contains the following sections:
“Considerations for Dual WAN Port Systems” on page 5-1
“Using the VPN Wizard for Client and Gateway Configurations” on page 5-3
“Testing the Connections and Viewing Status Information” on page 5-12
“Managing VPN Policies” on page 5-15
“Configuring Extended Authentication (XAUTH)” on page 5-18
“Assigning IP Addresses to Remote Users (ModeConfig)” on page 5-22
“Configuring Keepalives and Dead Peer Detection” on page 5-28
“Configuring NetBIOS Bridging with VPN” on page 5-30
Considerations for Dual WAN Port Systems
If both of the WAN ports of the VPN firewall are configured, you can enable either Auto-Rollover
mode for increased system reliability or Load Balancing mode for optimum bandwidth efficiency.
This WAN mode choice impacts how the VPN features must be configured.
The use of fully qualified domain names in VPN policies is mandatory when the WAN ports are in
load balancing or rollover mode; and is also required for the VPN tunnels to fail over. FQDN is
optional when the WAN ports are in load balancing mode if the IP addresses are static but
mandatory if the WAN IP addresses are dynamic.
Refer to
“Virtual Private Networks (VPNs)” on page C-10
for more on the IP addressing
requirements for VPN in the dual WAN modes. For instructions on how to select and configure a
dynamic DNS service for resolving FQDNs, see
“Configuring Dynamic DNS (Optional)” on
page 2-16
. For instructions on WAN mode configuration, see
“Configuring the WAN Mode
(Required for Dual WAN)” on page 2-10
.