Netgear FVS318N – Prosafe Wireless N VPN Firewall Reference Manual

Page of 426
Virtual Private Networking Using IPSec and L2TP Connections
250
ProSAFE Wireless-N 8-Port Gigabit VPN Firewall FVS318N 
Note:
The IKE policy settings that are described in the following table are 
specifically for a Mode Config configuration. 
227 
explains the general IKE policy settings.
Table 58.  Add IKE Policy screen settings for a Mode Config configuration
 
Setting
Description
Mode Config Record
Do you want to use 
Mode Config Record?
Select the Yes radio button.
Note:
 
Because Mode Config functions only in Aggressive mode, selecting the Yes 
radio button sets the tunnel exchange mode to Aggressive mode. Mode Config 
also requires that both the local and remote endpoints are defined by their FQDNs.
Select Mode 
Config Record
From the drop-down list, select the Mode Config record that 
you created in 
 on page 248. This example uses NA 
Sales.
General
Policy Name
A descriptive name of the IKE policy for identification and management purposes. 
This example uses ModeConfigNA_Sales.
Note:
 
The name is not supplied to the remote VPN endpoint.
Direction / Type
Responder is automatically selected when you select the Mode Config record in 
the Mode Config Record section of the screen. This ensures that the wireless VPN 
firewall responds to an IKE request from the remote endpoint but does not initiate 
one.
Exchange Mode
Aggressive mode is automatically selected when you select the Mode Config 
record in the Mode Config Record section of the screen.
Local
Identifier Type
From the drop-down list, select FQDN.
Note:
 
Mode Config requires that the wireless VPN firewall (that is, the local 
endpoint) is defined by an FQDN.
Identifier
Enter an FQDN for the wireless VPN firewall. This example 
uses router.com.
Remote
Identifier Type
From the drop-down list, select FQDN.
Note:
 
Mode Config requires that the remote endpoint is defined by an FQDN.
Identifier
Enter the FQDN for the remote endpoint. This needs to be an 
FQDN that is not used in any other IKE policy. This example 
uses client.com.