User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
Reference Manual for the NETGEAR ProSafe VPN Client
Using the Security Policy Editor 5-15
202-10015-01
• To encrypt and authenticate the data, select the Encapsulation Protocol (ESP) check box.
a. In the Encryption Algorithm box, click an option:
– For minimal security, DES
– For medium security, Triple-DES (the default)
– For maximum security, AES-128, AES-192, or AES-256
– For no security, Null
b. In the Hash Algorithm box, click an option:
– For minimal security, MD5
– For maximum security, SHA-1 (the default)
– DES-MAC
c. In the Encapsulation box, accept Tunnel (the default) or click Transport.
Note: If you selected the Connect using check box and a gateway when you configured
All Connections or a specific connection to be secured, Tunnel is the only option.
• To ensure that the data has not been altered, select the Authentication Protocol (AH)
check box.
a. In the Hash Algorithm box, click an option:
– For minimal security, MD5
– For maximum security, SHA-1 (the default)
b. In the Encapsulation box, accept Tunnel (the default) or click Transport.
Note: If you selected the Connect using check box and a gateway when you configured
All Connections or a specific connection to be secured, Tunnel is the only option.
8. If, when you configured Security Policy, you selected Use Manual Keys in the Select Phase 1
Negotiation Mode group, the Inbound Keys and Outbound Keys buttons are enabled. Go to
Enter manual keys.
9. Click Save.