User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
4 Index
IPSec (Internet Protocol security)
configure a gateway 5-9
IPSec Components B-2
IPSec SA negotiation B-9
IPSec Security Features B-2
isakmp.log 5-3
K
keyboard access 3-5
keyboard shortcuts 3-5
keys 5-3, 6-3, 6-8, 6-15
clear when smart card removed 5-3
export private with personal certificate 6-8
inbound 9-10, 9-11
outbound 9-10, 9-11
private/public pair 6-3
L
L2TP (Layer 2 Tunneling Protocol) 4-1, 4-5
add dial-up connection 4-1
configuration steps 4-1
configure security policy for 4-5
connecting over a modem 4-5
LNS 4-1, 4-5
secure the connection 4-5
LDAP (Lightweight Directory Access Protocol ) 5-16
LDAP server 5-16, 6-8
distinguished name format 5-16, 6-8
online personal certificate online 6-8
Lightweight Directory Access Protocol (LDAP) 5-27
LNS (L2TP network server) 4-1, 4-5
local machine store 6-5, 6-7, 6-8, 6-15
import a CA certificate 6-7
import a personal certificate 6-15
retrieve a CA certificate 6-5
select a CSP 6-8
locked security policy
import 5-28
Log Viewer 5-3, 9-3, 9-4, C-14, D-17
clear 9-3
enable logging to a file 5-3
freeze 9-3
isakmp.log file 5-3
pause 9-3
print 9-4
resume 9-3
save 9-4
unfreeze 9-3
M
MAC address A-9
Main Mode 5-12
manual CA enrollment 6-3
manual connections 5-5, 7-2
manual keys 9-10, 9-11, 9-13
configure 9-10
connect to remote party 9-13
disable 9-13
enable 9-10
enter 9-11
inbound keys 9-10, 9-11
outbound keys 9-10, 9-11
test 9-13
MD5 9-11
messages, IKE negotiation 5-3
modes 5-12
Aggressive Mode 5-12
Main Mode 5-12
move 5-20, 5-22, 5-25
connection 5-20
proposal 5-22
redundant gateway 5-25
My Identity 5-3, 5-10
N
netmask
translation table A-6
Network Address Translation A-8
non-secure communications 5-29
O
obtain 6-5, 6-8, 6-10
CA certificate 6-5, 6-7
CRLs 6-27