Netgear FVS336G-300NAS Specifications Page 404

  • Download
  • Add to my manuals
  • Print
  • Page
    / 693
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 403
Set Up Virtual Private Networking With IPSec Connections
404
ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv3
14. Click the Apply button.
Your settings are saved. The IKE policy that includes the Mode Config record is added to
the List of IKE Policies table. You can associate the IKE policy with a VPN policy.
Enable Dead Peer
Detection
Select a radio button to specify whether Dead Peer Detection (DPD) is enabled:
No. This feature is disabled. This is the default setting.
Yes. This feature is enabled. When the VPN firewall detects an IKE
connection failure, it removes the IPSec and IKE SA and forces a
reestablishment of the connection. You must specify the detection period in
the Detection Period field and the maximum number of times that the VPN
firewall attempts to reconnect in the Reconnect after failure count field.
Note: For more information, see Manage Keep-Alives and Dead Peer Detection
on page 414.
Detection Period The period in seconds between consecutive DPD R-U-THERE messages, which
are sent only when the IPSec traffic is idle.
Reconnect after failure
count
The maximum number of DPD failures before the VPN firewall tears down the
connection and then attempts to reconnect to the peer. The default is 3 failures.
Extended Authentication
XAUTH Configuration Select a radio button to specify whether Extended Authentication (XAUTH) is
enabled and, if enabled, which device is used to verify user account information:
None. XAUTH is disabled. This the default setting.
Edge Device. The VPN firewall functions as a VPN concentrator on which
one or more gateway tunnels terminate. The authentication modes that are
available for this configuration are User Database, RADIUS PAP, and RADIUS
CHAP.
IPSec Host. The VPN firewall functions as a VPN client of the remote
gateway. In this configuration, the VPN firewall is authenticated by a remote
gateway with a user name and password combination.
Note: For more information about XAUTH and its authentication modes, see
Enable and Configure Extended Authentication for VPN Clients on page 392.
Authentication Type If you select Edge Device from the AUTH Configuration menu, you must select
an authentication type from the Authentication Type menu:
User Database. XAUTH occurs through the VPN firewall’s user database. For
information about adding users, see
Manage User Accounts on page 502.
Radius PAP. XAUTH occurs through RADIUS Password Authentication
Protocol (PAP). The local user database is first checked. If the user account is
not present in the local user database, the VPN firewall connects to a
RADIUS server. For more information, see
Configure the RADIUS Servers for
the VPN Firewall’s RADIUS Client on page 395.
Radius CHAP. XAUTH occurs through RADIUS Challenge Handshake
Authentication Protocol (CHAP). For more information, see
Configure the
RADIUS Servers for the VPN Firewall’s RADIUS Client on page 395.
Username The user name for XAUTH.
Password The password for XAUTH.
Setting Description
Page view 403
1 2 ... 399 400 401 402 403 404 405 406 407 408 409 ... 692 693

Comments to this Manuals

No comments