Chapter 7

Virtual Private Networking

Using IPsec Connections

This chapter describes how to use the IP security (IPsec) virtual private networking (VPN) features of the UTM to provide secure, encrypted communications between your local network and a remote network or computer. This chapter contains the following sections:

“Considerations for Dual WAN Port Systems (Dual-WAN Port Models Only)” on this page.

“Using the IPsec VPN Wizard for Client and Gateway Configurations” on page 7-3.

“Testing the Connections and Viewing Status Information” on page 7-17.

“Managing IPsec VPN Policies” on page 7-22.

“Configuring Extended Authentication (XAUTH)” on page 7-38.

“Assigning IP Addresses to Remote Users (Mode Config)” on page 7-43.

“Configuring Keepalives and Dead Peer Detection” on page 7-55.

“Configuring NetBIOS Bridging with IPsec VPN” on page 7-59.

Considerations for Dual WAN Port Systems (Dual-WAN Port Models Only)

On the dual-WAN port models only, if both of the WAN ports are configured, you can enable either auto-rollover mode for increased system reliability or load balancing mode for optimum bandwidth efficiency. Your WAN mode selection impacts how the VPN features must be configured.

The use of fully qualified domain names (FQDNs) in VPN policies is mandatory when the WAN ports function in auto-rollover mode or load balancing mode, and is also required for VPN tunnel failover. When the WAN ports function in load balancing mode, you cannot configure VPN tunnel failover. A FQDN is optional when the WAN ports function in load balancing mode if the IP addresses are static but mandatory if the WAN IP addresses are dynamic.

7-1

v1.0, January 2010

Page 213
Image 213
NETGEAR UTM5-100NAS, UTM50-100NAS manual Chapter Virtual Private Networking Using IPsec Connections