ProSafe VPN Firewall 200 FVX538 Reference Manual

Remote ID. The IKE/ISAKMP identify of the remote VPN Gateway. (The remote VPN must have this value as their “Local ID”.)

Encr. Encryption Algorithm used for the IKE SA. The default setting using the VPN Wizard is 3DES. (This setting must match the Remote VPN.)

Auth. Authentication Algorithm used for the IKE SA. The default setting using the VPN Wizard is SHA1. (This setting must match the Remote VPN.)

DH. Diffie-Hellman Group. The Diffie-Hellman algorithm is used when exchanging keys. The DH Group sets the number of bits. The VPN Wizard default setting is Group 2. (This setting must match the Remote VPN.)

To gain a more complete understanding of the encryption, authentication and DH algorithm technologies, see Appendix B, “Related Documents” for a link to the NETGEAR website.

VPN Policy

You can create two types of VPN Policies. When using the VPN Wizard to create a VPN policy, only the Auto method is available.

Manual. All settings (including the keys) for the VPN tunnel are manually input at each end (both VPN Endpoints). No third party server or organization is involved.

Auto. Some parameters for the VPN tunnel are generated automatically by using the IKE (Internet Key Exchange) protocol to perform negotiations between the two VPN Endpoints (the Local ID Endpoint and the Remote ID Endpoint).

In addition, a CA (Certificate Authority) can also be used to perform authentication (see “Certificate Authorities” on page 5-27). To use a CA, each VPN Gateway must have a Certificate from the CA. For each Certificate, there is both a “Public Key” and a “Private Key”. The “Public Key” is freely distributed, and is used to encrypt data. The receiver then uses their “Private Key” to decrypt the data (without the Private Key, decryption is impossible). CAs can be beneficial since using them reduces the amount of data entry required on each VPN Endpoint.

Managing VPN Policies

The VPN Policies screen allows you to add additional policies—either Auto or Manual—and to manage the VPN policies already created. You can edit policies, enable or disable policies, or delete them entirely. The rules for VPN policy use are:

1.Traffic covered by a policy will automatically be sent via a VPN tunnel.

2.When traffic is covered by two or more policies, the first matching policy will be used. (In this situation, the order of the policies is important. However, if you have only one policy for each remote VPN Endpoint, then the policy order is not important.)

5-12

Virtual Private Networking

v1.0, August 2006

Page 114
Image 114
NETGEAR VPN Firewall 200 FVX538 manual VPN Policy, Managing VPN Policies

VPN Firewall 200 FVX538 specifications

The NETGEAR VPN Firewall 200 FVX538 is a robust solution designed to meet the networking needs of small to medium-sized businesses. Engineered for resource management and security, this firewall combines the essential features of a VPN (Virtual Private Network) and firewall functionality into a single device, enabling secure, high-speed connectivity for various devices in any organizational environment.

One of the standout features of the FVX538 is its integrated VPN support, capable of handling up to 5 simultaneous VPN connections. This is particularly beneficial for remote workers and branch offices that require secure access to the company network. The device supports IPsec and L2TP VPN protocols, which helps ensure the integrity and confidentiality of data transmitted over the internet.

Another key characteristic of the FVX538 is its advanced firewall capabilities. This unit employs Stateful Packet Inspection (SPI) that scrutinizes incoming and outgoing packets, ensuring that only legitimate traffic is permitted. With customizable access control policies, network administrators can define specific permissions for various users. This feature is crucial for maintaining a secure environment and preventing unauthorized access to sensitive information.

The device also supports multiple WAN (Wide Area Network) connections, allowing for load balancing and failover capabilities. By utilizing two WAN ports, the FVX538 can switch between internet connections seamlessly, ensuring optimal uptime and performance even during network disruptions. Such functionality is essential for businesses that rely on constant connectivity.

Additionally, the FVX538 includes various security features such as Denial of Service (DoS) protection, NAT (Network Address Translation) support, and DHCP (Dynamic Host Configuration Protocol) server functionalities. These features work together to create a secure networking environment while simplifying the management of IP addresses within the network.

The user-friendly web management interface of the FVX538 makes it accessible for network administrators of all skill levels. With comprehensive logging and monitoring capabilities, organizations can keep an eye on network activities, enabling them to react swiftly to any potential threats.

In conclusion, the NETGEAR VPN Firewall 200 FVX538 stands out as a versatile, secure, and efficient solution for businesses looking to enhance their network security and performance. With its combination of VPN capabilities, robust firewall features, and user-friendly management tools, it is a reliable choice for ensuring secure and efficient networking operations.