User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
Reference Manual for the NETGEAR ProSafe VPN Client
Troubleshooting 9-11
202-10015-01
– For minimal security, MD5
– For maximum security, SHA-1 (the default)
– DES-MAC
Record your selection; you need it to determine the length of the key for the ESP
Authentication Key box when entering inbound and outbound keys.
c. In the Encapsulation box, accept Tunnel (the default) or click Transport.
Note: If you selected the Connect using check box and a gateway when you configured
All Connections or a specific connection to be secured, Tunnel is the only option.
• To ensure that the data has not been altered, select the Authentication Protocol (AH)
check box.
a. In the Hash Algorithm box, click an option:
– MD5 for minimal security
– SHA-1 for maximum security (the default)
Record your selection; you need it to determine the length of the key for the AH
Authentication Key box when entering inbound and outbound keys.
b. In the Encapsulation box, accept Tunnel (the default) or click Transport.
Note: If you selected the Connect using check box and a gateway when you configured
All Connections or a specific connection to be secured, Tunnel is the only option.
– Make sure that the remote party configures the same options in its VPN software.
9. Enter inbound and outbound manual keys.
10. Click Save.
Enter Inbound and Outbound Manual Keys
Before you perform this task, make sure that the particular connection is Enabled for manual keys.
1. In the Security Policy Editor, in the Network Security Policy list, expand the secure
connection .
2. Expand Security Policy.
3. Expand Key Exchange (Phase 2).
4. Click the proposal to enter manuals keys for.