User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
Reference Manual for the NETGEAR ProSafe VPN Client
Using the Security Policy Editor 5-23
202-10015-01
6.
Repeat steps 4 and 5 as necessary.
7. Click Save.
Delete a Proposal
In the Network Security Policy list in the Security Policy Editor, there must be at least one
proposal each for Authentication (Phase 1) and Key Exchange (Phase 2).
1. In the Security Policy Editor, in the Network Security Policy list, expand a secure connection
.
2. Expand Security Policy for the secure connection. Authentication (Phase 1) and Key
Exchange (Phase 2) display.
3. Depending on the location of the proposal you want to delete, expand Authentication (Phase
1) or Key Exchange (Phase 2). The proposals for the phase display.
4. Click the proposal to delete.
5. Click .
6. When a confirmation message box opens, click Yes .
7. Click Save.
Manage Redundant Gateways
A redundant gateway is an alternate network access gateway to establish a connection with the
client when the primary gateway is busy, offline, or otherwise not available.
Before you can add redundant gateways for a secure connection, you must configure the primary
gateway in the Security Policy Editor.
In most cases, use the same security policy information to configure all redundant gateways for a
single connection. However, these exceptions must be unique to each device:
• Distinguished name
• IP address
• Preshared key
Each secure connection can have a maximum of 10 redundant gateways, plus the primary. The
original secure connection is always the primary gateway.