Netgear FVS336G FVS336G Reference Manual - Page 113

Configuring the FVS336G, Configuring the VPN Client, VPN Client, Apply, VPN Policies, Edge Device

Page 113 highlights

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual • NETGEAR ProSafe VPN Client • NAT router: NETGEAR FR114P Configuring the FVS336G 1. Select VPN > IPsec VPN in the main menu. Select the VPN Wizard tab. 2. Select the VPN Client radio button for type of VPN connection. 3. Give the client connection a name, such as "home". 4. Enter a value for the pre-shared key. 5. Check either the WAN1 or WAN2 radio button to select the WAN interface tunnel. 6. Enter the remote WAN's IP Address or Internet Name and then enter the local WAN's IP Address or Internet Name. In this example, we are using their FQDNs. (Both the local and remote addresses must be of the same type-either both must be FQDN or both must be an IP address.) 7. Click Apply to create the "home" VPN Client. The VPN Policies screen is displayed showing the VPN Client policy as enabled. 8. Click the IKE Policies tab to display the IKE Policies table and click Edit adjacent to the "home" policy to view the "home" policy details. You can augment user authentication security by enabling the XAUTH server by selecting the Edge Device radio button and then adding users to the user database (see "Configuring Extended Authentication (XAUTH)" on page 5-19 and "User Database Configuration" on page 5-21, respectively). As an alternative to the local user database, you can also choose a RADIUS server. Configuring the VPN Client From a PC with the NETGEAR Prosafe VPN Client installed, you can configure a VPN client policy to connect to the FVS336G. To configure your VPN client: 1. Right-click on the VPN client icon in your Windows toolbar and choose Security Policy Editor. 2. In the upper left of the Policy Editor window, click the New Document icon to open a New Connection.Give the New Connection a name, such as to_FVG. 3. From the ID Type pull-down menu, choose IP Subnet. Virtual Private Networking Using IPsec v1.2, June 2008 5-17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Virtual Private Networking Using IPsec
5-17
v1.2, June 2008
NETGEAR ProSafe VPN Client
NAT router: NETGEAR FR114P
Configuring the FVS336G
1.
Select VPN > IPsec VPN in the main menu. Select the VPN Wizard tab.
2.
Select the
VPN Client
radio button for type of VPN connection.
3.
Give the client connection a name, such as “home”.
4.
Enter a value for the pre-shared key.
5.
Check either the WAN1 or WAN2 radio button to select the WAN interface tunnel.
6.
Enter the remote WAN’s IP Address or Internet Name and then enter the local WAN’s IP
Address or Internet Name. In this example, we are using their FQDNs. (Both the local and
remote addresses must be of the same type—either both must be FQDN or both must be an IP
address.)
7.
Click
Apply
to create the “home” VPN Client. The
VPN Policies
screen is displayed showing
the VPN Client policy as enabled.
8.
Click the
IKE Policies
tab to display the
IKE Policies
table and click
Edit
adjacent to the
“home” policy to view the “home” policy details.
You can augment user authentication security by enabling the XAUTH server by selecting the
Edge Device
radio button and then adding users to the user database (see
“Configuring
Extended Authentication (XAUTH)” on page 5-19
and
“User Database Configuration” on
page 5-21
, respectively). As an alternative to the local user database, you can also choose a
RADIUS server.
Configuring the VPN Client
From a PC with the NETGEAR Prosafe VPN Client installed, you can configure a VPN client
policy to connect to the FVS336G.
To configure your VPN client:
1.
Right-click on the VPN client icon in your Windows toolbar and choose
Security Policy
Editor
.
2.
In the upper left of the Policy Editor window, click the New Document icon to open a New
Connection.Give the New Connection a name, such as
to_FVG
.
3.
From the
ID Type
pull-down menu, choose
IP Subnet
.