Chapter 5

Basic Virtual Private Networking

This chapter describes how to use the virtual private networking (VPN) features of the VPN firewall. VPN communications paths are called tunnels. VPN tunnels provide secure, encrypted communications between your local network and a remote network or computer.

The VPN information is organized as follows:

“Overview of VPN Configuration” on page 5-2 provides an overview of the two most common VPN configurations: client-to-gateway and gateway-to-gateway.

“Planning a VPN” on page 5-3provides the VPN Committee (VPNC) recommended default parameters set by the VPN Wizard.

“VPN Tunnel Configuration” on page 5-4 summarizes the two ways to configure a VPN tunnel: VPN Wizard (recommended for most situations) and Advanced (see Chapter 6, “Advanced Virtual Private Networking).

“Setting Up a Client-to-Gateway VPN Configuration” on page 5-5 provides the steps needed to configure a VPN tunnel between a remote PC and a network gateway using the VPN Wizard and the NETGEAR ProSafe VPN Client.

“Setting Up a Gateway-to-Gateway VPN Configuration” on page 5-19 provides the steps needed to configure a VPN tunnel between two network gateways using the VPN Wizard.

“Activating a VPN Tunnel” on page 5-23provides the step-by-step procedures for activating, verifying, deactivating, and deleting a VPN tunnel once the VPN tunnel has been configured.

Chapter 6, “Advanced Virtual Private Networking” provides the steps needed to configure VPN tunnels when there are special circumstances and the VPNC recommended defaults of the VPN Wizard are inappropriate.

Appendix B, “Related Documents” has a link to “Virtual Private Networking (VPN)” which discusses Virtual Private Networking (VPN) Internet Protocol security (IPSec). IPSec is one of the most complete, secure, and commercially available, standards-based protocols developed for transporting data.

Appendix C, “VPN Configuration of NETGEAR FVG318” presents a case study on how to configure a secure IPSec VPN tunnel from a NETGEAR FVG318 to a FVL328. This case study follows the VPN Consortium interoperability profile guidelines (found at http://www.vpnc.org/InteropProfiles/Interop-01.html).

Basic Virtual Private Networking

5-1

v1.0, September 2007

Page 79
Image 79
NETGEAR FVG318NA manual Chapter Basic Virtual Private Networking