Netgear SRX5308 Specifications Page 165

  • Download
  • Add to my manuals
  • Print
  • Page
    / 357
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 164
Virtual Private Networking Using IPSec Connections
165
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
4. Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.
To edit an IKE policy:
1. Select VPN > IPSec VPN. The IPSec VPN submenu tabs display, with the IKE Policies
screen in view (see Figure 104 on page 160).
2. In the List of IKE Policies table, click the Edit table button to the right of the IKE policy that
you want to edit. The Edit IKE Policy screen displays. This screen shows the same field as
the Add IKE Policy screen (see Figure 105 on page 161).
3. Modify the settings that you wish to change (see the previous table).
4. Click Apply to save your changes. The modified IKE policy is displayed in the List of IKE
Policies table.
Configure VPN Policies
You can create two types of VPN policies. When you use the VPN Wizard to create a VPN
policy, only the Auto method is available.
Manual. You manually enter all settings (including the keys) for the VPN tunnel on the
VPN firewall and on the remote VPN endpoint. No third-party server or organization is
involved.
Auto. Some settings for the VPN tunnel are generated automatically by using the IKE
(Internet Key Exchange) Protocol to perform negotiations between the two VPN
endpoints (the local ID endpoint and the remote ID endpoint). You still need to manually
enter all settings on the remote VPN endpoint (unless the remote VPN endpoint also has
a VPN Wizard).
XAUTH Configuration
(continued)
Authentication
Type
For an Edge Device configuration: from the drop-down list,
select one of the following authentication types:
User Database. XAUTH occurs through the VPN firewall’s
user database. Users need to be added through the Add
User screen (see User Database Configuration on
page 174).
Radius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the VPN firewall connects to a RADIUS
server. For more information, see RADIUS Client
Configuration on page 174.
Radius CHAP. XAUTH occurs through RADIUS Challenge
Handshake Authentication Protocol (CHAP). For more
information, see RADIUS Client Configuration on page 174.
Username The user name for XAUTH.
Password The password for XAUTH.
Table 38. Add IKE Policy screen settings (continued)
Setting Description
Page view 164
1 2 ... 160 161 162 163 164 165 166 167 168 169 170 ... 356 357

Comments to this Manuals

No comments