Netgear 05200007 User Manual

Page of 186
Reference Manual for the NETGEAR ProSafe VPN Client
B-6
Virtual Private Networking
202-10015-01
Key Management
IPSec uses the Internet Key Exchange (IKE) protocol to facilitate and automate the SA setup and 
the exchange of keys between parties transferring data. Using keys ensures that only the sender 
and receiver of a message can access it.
IPSec requires that keys be re-created, or refreshed, frequently so that the parties can communicate 
securely with each other. IKE manages the process of refreshing keys; however, a user can control 
the key strength and the refresh frequency. Refreshing keys on a regular basis ensures data 
confidentiality between sender and receiver.
Understand the Process Before You Begin
It is a good idea to gather all the necessary information required to establish a VPN before you 
begin the configuration process. You should understand whether the firmware is up to date, all of 
the addresses that will be necessary, and all of the parameters that need to be set on both sides. Try 
to understand any incompatibilities before you begin, so that you minimize any potential 
complications which may arise from normal firewall or WAN processes.
NETGEAR is a member of the VPN Consortium, a group formed to facilitate IPSec VPN vendor 
interoperability. The VPN Consortium has developed specific scenarios to aid system 
administrators in the often confusing process of connecting two different vendor implementations 
of the IPSec standard. Additional information regarding inter-vendor interoperability may be 
found at 
http://www.vpnc.org/interop.html
If you are not a full-time system administrator, it is a good idea to familiarize yourself with the 
mechanics of a VPN. The brief description in this document will help. Other good sources include:
The NETGEAR VPN Tutorial – http://www.netgear.com/planetvpn/pvpn_2.html
The VPN Consortium – 
http://www.vpnc.org/
The VPN bibliography in 
.
VPN Process Overview
Even though IPSec is standards-based, each vendor has its own set of terms and procedures for 
implementing the standard. Because of these differences, it may be a good idea to review some of