ProSecure Unified Threat Management (UTM) Appliance

Table 72. Add IKE Policy screen settings (continued)

Setting

Description

Extended Authentication

XAUTH Configuration

Note: For more information about XAUTH and its authentication modes, see Configure XAUTH for VPN Clients on page 309.

Select one of the following radio buttons to specify whether Extended Authentication (XAUTH) is enabled, and, if enabled, which device is used to verify user account information:

None. XAUTH is disabled. This the default setting.

Edge Device. The UTM functions as a VPN concentrator on which one or more gateway tunnels terminate. The authentication modes that are available for this configuration are User Database, RADIUS PAP, or RADIUS CHAP.

IPSec Host. The UTM functions as a VPN client of the remote gateway. In this configuration, the UTM is authenticated by a remote gateway with a user name and password combination.

Authentication

For an Edge Device configuration, from the drop-down list,

Type

select one of the following authentication types:

 

User Database. XAUTH occurs through the UTM’s user

 

database. You can add users on the Add User screen

 

(see User Database Configuration on page 310).

 

Radius PAP. XAUTH occurs through RADIUS Password

 

Authentication Protocol (PAP). The local user database is

 

first checked. If the user account is not present in the

 

local user database, the UTM connects to a RADIUS

 

server. For more information, see RADIUS Client and

 

Server Configuration on page 310.

 

Radius CHAP. XAUTH occurs through RADIUS

 

Challenge Handshake Authentication Protocol (CHAP).

 

For more information, see RADIUS Client and Server

 

Configuration on page 310.

Username

The user name for XAUTH.

 

 

Password

The password for XAUTH.

 

 

4.Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.

To edit an IKE policy:

1.Select VPN > IPSec VPN. The IPSec VPN submenu tabs display with the IKE Policies screen in view (see Figure 179 on page 293).

2.In the List of IKE Policies table, click the Edit table button to the right of the IKE policy that you want to edit. The Edit IKE Policy screen displays. This screen shows the same fields as the Add IKE Policy screen (see Figure 180 on page 295).

3.Modify the settings that you wish to change (see the previous table).

4.Click Apply to save your changes. The modified IKE policy is displayed in the List of IKE Policies table.

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections

299

Page 299
Image 299
NETGEAR STM150EW-100NAS, UTM5EW-100NAS manual  To edit an IKE policy, 299, Setting Description Extended Authentication