Netgear FVS336G Verweisanleitung

Seite von 233
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Virtual Private Networking Using IPsec
5-15
v1.0, October 2007
Main Mode is slower but more secure. 
Aggressive mode is faster but less secure. (If specifying either a FQDN or a User FQDN 
name as the Local ID/Remote ID, aggressive mode is automatically selected.)
Local ID. The IKE/ISAKMP identify of this device. (The remote VPN must have this value as 
their “Remote ID”.) 
Remote ID. The IKE/ISAKMP identify of the remote VPN gateway. (The remote VPN must 
have this value as its Local ID.) 
Encr. Encryption algorithm used for the IKE SA. The default setting using the VPN Wizard is 
3DES. (This setting must match the Remote VPN.) 
Auth. Authentication Algorithm used for the IKE SA. The default setting using the VPN 
Wizard is SHA1. (This setting must match the Remote VPN.) 
DH. The Diffie-Hellman (DH) group used when exchanging keys. The DH group sets the 
number of bits. The VPN Wizard default setting is Group 2. (This setting must match the 
remote VPN.) 
To gain a more complete understanding of the encryption, authentication and DH algorithm 
technologies, se
 for a link to the NETGEAR website.
VPN Policy 
You can create two types of VPN policies. When using the VPN Wizard to create a VPN policy, 
only the Auto method is available. 
Manual. All settings (including the keys) for the VPN tunnel are manually input at each end 
(both VPN Endpoints). No third party server or organization is involved. 
Auto. Some parameters for the VPN tunnel are generated automatically by using the IKE 
(Internet Key Exchange) protocol to perform negotiations between the two VPN Endpoints 
(the Local ID Endpoint and the Remote ID Endpoint).
In addition, a Certificate Authority (CA) can also be used to perform authentication (see 
). To use a CA, each VPN gateway must have a certificate 
from the CA. For each certificate, there is both a public key and a private key. The public key is 
freely distributed, and is used to encrypt data. The receiver then uses its private key to decrypt the 
data (without the private key, decryption is impossible). The use of certificates for authentication 
reduces the amount of data entry required on each VPN endpoint.