Netgear SRX5308 User Manual Page 251

  • Download
  • Add to my manuals
  • Print
  • Page
    / 460
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 250
Virtual Private Networking Using IPSec and L2TP Connections
251
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
9. Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.
Configure the ProSafe VPN Client for Mode Config Operation
When the Mode Config feature is enabled, the following information is negotiated between
the VPN client and the VPN firewall during the authentication phase:
V
irtual IP address of the VPN client
DNS se
rver address (optional)
W
INS server address (optional)
The virtual IP address that is issued by the VPN fire
wall is displayed in the VPN Client
Address field on the VPN client’s IPSec pane.
Extended Authentication
XAUTH Configuration
Note: For more
information ab
out
XAUTH and its
authentication
modes, see Configure
XAUTH for VPN
Clients on
page 240.
Select one of the following radio buttons to specify whether Extended
Au
thentication (XAUTH) is enabled, and, if enabled, which device is used to verify
user account information:
No
ne. XAUTH is disabled. This the default setting.
Edge Device. The VPN firewall functions as a VPN concentrator on which one
or more gateway tunnels terminate. The authentication modes that are available
for this configuration are User Database, RADIUS PAP, and RADIUS CHAP.
IPSec Hos
t. The VPN firewall functions as a VPN client of the remote gateway.
In this configuration, the VPN firewall is authenticated by a remote gateway with
a user name and password combination.
Authentication
Ty
pe
For an Edge Device configuration, from the drop-down list,
select one of the following authentication types:
Use
r Database. XAUTH occurs through the VPN firewall’s
user database. You can add users on the Add User screen
(see User Database Configuration o
n page 241).
Radius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the VPN firewall connects to a RADIUS
server. For more information, see RADIUS Client and Server
Configuration o
n page 241.
Radius CHAP. XAUT
H occurs through RADIUS Challenge
Handshake Authentication Protocol (CHAP). For more
information, see RADIUS Client and Server Configuration on
page 241.
Username The user name for XAUTH.
Password The password for XAUTH.
Table 59. Add IKE Policy screen settings for a Mode Config configuration (continued)
Setting Description
Page view 250
1 2 ... 246 247 248 249 250 251 252 253 254 255 256 ... 459 460

Comments to this Manuals

No comments