Netgear FVS318N – Prosafe Wireless N VPN Firewall Reference Manual
Virtual Private Networking Using IPSec and L2TP Connections
251
ProSAFE Wireless-N 8-Port Gigabit VPN Firewall FVS318N
IKE SA Parameters
Note:
Generally, the default settings work well for a Mode Config configuration.
Encryption Algorithm
To negotiate the security association (SA), from the drop-down list, select the
3DES algorithm.
3DES algorithm.
Authentication
Algorithm
Algorithm
From the drop-down list, select the SHA-1 algorithm to be used in the VPN header
for the authentication process.
for the authentication process.
Authentication Method Select Pre-shared key as the authentication method, and enter a key in the
Pre-shared key field.
Pre-shared key
A key with a minimum length of eight characters and no more
than 49 characters. Do not use a double quote (''), single
quote('), or space in the key. This example uses
H8!spsf3#JYK2!.
quote('), or space in the key. This example uses
H8!spsf3#JYK2!.
Diffie-Hellman (DH)
Group
Group
The DH Group sets the strength of the algorithm in bits. From the drop-down list,
select Group 2 (1024 bit).
select Group 2 (1024 bit).
SA-Lifetime (sec)
The period in seconds for which the IKE SA is valid. When the period times out, the
next rekeying occurs. The default setting is 28800 seconds (eight
next rekeying occurs. The default setting is 28800 seconds (eight
hours).
However,
for a Mode Config configuration, NETGEAR recommends 3600
seconds
(one
(one
hour).
Enable Dead Peer
Detection
Detection
Note:
See also
Select a radio button to specify whether Dead Peer Detection (DPD) is enabled:
•
Yes. This feature is enabled. When the wireless VPN firewall detects an IKE
connection failure, it deletes the IPSec and IKE SA and forces a
reestablishment of the connection. You need to specify the detection period in
the Detection Period field and the maximum number of times that the wireless
VPN firewall attempts to reconnect in the Reconnect after failure count field.
connection failure, it deletes the IPSec and IKE SA and forces a
reestablishment of the connection. You need to specify the detection period in
the Detection Period field and the maximum number of times that the wireless
VPN firewall attempts to reconnect in the Reconnect after failure count field.
•
No. This feature is disabled. This is the default setting.
Detection Period
The period in seconds between consecutive
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle. The default setting is 10 seconds. This
example uses 30 seconds.
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle. The default setting is 10 seconds. This
example uses 30 seconds.
Reconnect after
failure count
failure count
The maximum number of DPD failures before the wireless
VPN firewall tears down the connection and then attempts to
reconnect to the peer. The default setting is three failures.
VPN firewall tears down the connection and then attempts to
reconnect to the peer. The default setting is three failures.
Table 58. Add IKE Policy screen settings for a Mode Config configuration (continued)
Setting
Description