ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N

Configure Gateway 2 at Site 2

To create a gateway-to-gateway VPN tunnel to Gateway 1, using the IPSec VPN wizard:

1.Select VPN > IPSec VPN > VPN Wizard. The VPN Wizard screen displays.

2.Configure a gateway-to-gateway VPN tunnel using the following information:

Connection name. Any name of your choice

Pre-shared key. The same key as you configured on Gateway 1

Remote WAN IP address. 10.0.0.1

Local WAN IP address. 10.0.0.2

Remote LAN IP Address. 192.168.10.0

Remote LAN subnet mask. 255.255.255.0

3.Click Apply to save the settings.

To change the local IP address in the VPN policy:

1.Select VPN > IPSec VPN > VPN Policies. The VPN Policy screen displays.

2.Next to the policy name for the Gateway 2–to–Gateway 1 autopolicy, click Edit. The Edit VPN Policy screen displays.

3.In the General section of the screen, clear the Enable NetBIOS check box.

4.In the Traffic Selector section of the screen, make the following changes:

From the Local IP drop-down list, select Single.

In the Start IP fields, type 10.0.0.2, which is the WAN IP address of Gateway 2.

5.Click Apply to save the settings.

To specify the syslog server that is connected to Gateway 1:

1.Select Monitoring > Firewall Logs & E-mail. The Firewall Logs & E-mail screen displays.

2.Enable the syslog server and specify its IP address at Site 1. Enter 192.168.10.2 as the IP address.

3.Click Apply to save the settings.

Note: The VPN tunnel should be established automatically, and the syslogs should be sent to the syslog server at Site 1. You can use the IPSec VPN Connection Status screen to verify the connection.

Monitor System Access and Performance

355

Page 355
Image 355
NETGEAR FVS318N manual Configure Gateway 2 at Site,  To change the local IP address in the VPN policy, 355