User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
Index 7
edit 5-27
import 5-28
reactivate 5-29
reload 5-28
retrieve automatically 5-30
save when uninstalling 3-4
Security Policy Editor 5-1
basic steps 5-1
See Layer 2 Tunneling Protocol (L2TP) 4-1
See policy 3-4
See root CA certificate 6-2
See subordinate CA 6-2
select certificate automatically 5-10
SHA-1 9-10, 9-11
smart card 5-3
smart card removal and keys 5-3
SoftRemoteLT 3-4
uninstall 3-4
upgrade 3-4
Specified Connections 5-4, 5-5
start secure connection manually 7-2
stateful packet inspection A-11
status notifications 5-3
stop secure connection manually 7-2
subnet addressing A-4
subnet mask A-5
T
TCP/IP
configuring B-1
terminate secure connection manually 7-2
Testing and Troubleshooting B-11
Transport Mode B-5
Triple DES 9-10, 9-11
Triple-DES 9-10, 9-11
troubleshooting tools 5-3, 5-28
isakmp.log 5-3
log file 5-3
Reload the security policy 5-28
trust policy 6-29
set 6-29
Tunnel Mode B-5
U
unfreeze, Log Viewer 9-3
uninstall 3-4
update CRLs 6-27
upgrade 3-4
user authentication 7-1
V
verify 6-19
CA certificate 6-19
personal certificate 6-19
RA certificate 6-19
root CA certificate 6-19
view 6-11, 6-28, 6-29
certificate request 6-11
CRL 6-28
log file 5-3
trust policy 6-29
trusted root CA certificates 6-29
virtual adapter 4-1, 5-1, 5-3, 5-10
VPN B-1
VPN Adapter, SafeNet 4-1
VPN Consortium B-6
VPN Process Overview B-6
VPNC IKE Phase I Parameters B-10
VPNC IKE Phase II Parameters B-11
W
World Wide Web 1-ii