201-10301-02, May 2005
xii Contents
Is WPA Perfect? .............. ... ... ................................................................................ E-16
Product Support for WPA ...................................................................................... E-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged ...... E-16
Changes to Wireless Access Points ............................................................... E-17
Changes to Wireless Network Adapters ......................................................... E-17
Changes to Wireless Client Programs ................ ............................. ............... E-18
Appendix F
Virtual Private Networking
What is a VPN? ..............................................................................................................F-1
What is IPSec and How Does It Work? ..........................................................................F-2
IPSec Security Features .... .................... ... ................... ... .... ................... ... ............... F-2
IPSec Components ......... ... ... .... ... ... ... .... ... ... ................... .................... ................... ..F-2
Encapsulating Security Payload (ESP) ....................................................................F-3
Authentication Header (AH) ............... .... ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ..F-4
IKE Security Association . ... ... .... ... ... ... .... ... ... ... ... .................... ................... ............... F-4
Mode ............... ....................... ...................... ....................... ....................... ........F-5
Key Management .....................................................................................................F-6
Understand the Process Before You Begin ....................................................................F-6
VPN Process Overview ................... ... ... ... .... ... ... ... ... .... ... ... ... .................... ................... ..F-7
Network Interfaces and Addresses ..........................................................................F-7
Interface Addressing ..........................................................................................F-7
Firewalls ............................................................................................................F-8
Setting Up a VPN Tunnel Between Gateways .........................................................F-8
VPNC IKE Security Parameters ...................................................................................F-10
VPNC IKE Phase I Parameters ..............................................................................F-10
VPNC IKE Phase II Parameters .............................................................................F-11
Testing and Troubleshooting .........................................................................................F-11
Additional Reading ................... ... .... ... ... ... .... ... ................... .................... ................... ...F-11
Appendix G
NETGEAR VPN Configuration
FVS318 or FVM318 to FWG114P v2
Configuration Template ... .... ...........................................................................................G-1
Step-By-Step Configuration of FVS318 or FVM318 Gateway A ....................................G-2
Step-By-Step Configuration of FWG114P Gateway B ...................................................G-5
Test the VPN Connection ..............................................................................................G-9