Netgear FVS336G FVS336G Reference Manual - Page 97

Virtual Private Networking Using IPsec, Considerations for Dual WAN Port Systems

Page 97 highlights

Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide secure, encrypted communications between your local network and a remote network or computer. This chapter contains the following sections: • "Considerations for Dual WAN Port Systems" on page 5-1 • "Configuring an IPsec VPN Connection using the VPN Wizard" on page 5-4 • "Managing VPN Tunnel Policies" on page 5-13 • "Creating a VPN Client Connection: VPN Client to FVS336G" on page 5-16 • "Configuring Extended Authentication (XAUTH)" on page 5-19 • "Manually Assigning IP Addresses to Remote Users (ModeConfig)" on page 5-23 • "Configuring Keepalives and Dead Peer Detection" on page 5-29 • "Configuring NetBIOS Bridging with VPN" on page 5-31 Considerations for Dual WAN Port Systems If both of the WAN ports of the VPN firewall are configured, you can enable either Auto-Rollover mode for increased system reliability or Load Balancing mode for optimum bandwidth efficiency. The WAN mode selection determines how several of the VPN features must be configured. Refer to "Virtual Private Networks (VPNs)" on page C-10 for an overview of the IP addressing requirements for VPN in the two dual WAN modes. To aid in determining the WAN addressing requirements (FQDN or IP address) for your VPN tunnel in either dual WAN mode, see Table 5-1. Table 5-1. IP Addressing for VPNs in Dual WAN Port Systems Configuration and WAN IP address VPN Road Warrior (client-to-gateway) Fixed Dynamic Rollover Modea FQDN required FQDN required Load Balancing Mode Allowed (FQDN optional) FQDN required 5-1 v1.2, June 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245

5-1
v1.2, June 2008
Chapter 5
Virtual Private Networking Using IPsec
This chapter describes how to use the IPsec virtual private networking (VPN) features of the
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide secure, encrypted
communications between your local network and a remote network or computer.
This chapter contains the following sections:
“Considerations for Dual WAN Port Systems” on page 5-1
“Configuring an IPsec VPN Connection using the VPN Wizard” on page 5-4
“Managing VPN Tunnel Policies” on page 5-13
“Creating a VPN Client Connection: VPN Client to FVS336G” on page 5-16
“Configuring Extended Authentication (XAUTH)” on page 5-19
“Manually Assigning IP Addresses to Remote Users (ModeConfig)” on page 5-23
“Configuring Keepalives and Dead Peer Detection” on page 5-29
“Configuring NetBIOS Bridging with VPN” on page 5-31
Considerations for Dual WAN Port Systems
If both of the WAN ports of the VPN firewall are configured, you can enable either Auto-Rollover
mode for increased system reliability or Load Balancing mode for optimum bandwidth efficiency.
The WAN mode selection determines how several of the VPN features must be configured.
Refer to
“Virtual Private Networks (VPNs)” on page C-10
for an overview of the IP addressing
requirements for VPN in the two dual WAN modes. To aid in determining the WAN addressing
requirements (FQDN or IP address) for your VPN tunnel in either dual WAN mode, see
Table 5-1
.
Table 5-1.
IP Addressing for VPNs in Dual WAN Port Systems
Configuration and WAN IP address
Rollover Mode
a
Load Balancing Mode
VPN Road Warrior
(client-to-gateway)
Fixed
FQDN required
Allowed (FQDN optional)
Dynamic
FQDN required
FQDN required