Netgear FVS318Gv2 – ProSAFE VPN Firewall Series Manual De Usuario
Introduction
8
NETGEAR ProSAFE VPN Client
User authentication
Supports the following user authentication methods:
•
Pre-shared keying and X509 certificate support. Compatible with most of the
currently available IPSec gateways.
currently available IPSec gateways.
•
Extended authentication (AUTH).
•
Flexible certificates: PEM, PKCS#12 certificates can be directly imported from the
user interface. Ability to configure one certificate per tunnel.
user interface. Ability to configure one certificate per tunnel.
•
Hybrid authentication method.
Certificate storage capabilities:
•
USB token and smart card support
•
Personal Certificate Store support
•
VPN configuration file
Remote login:
•
Gina mode is supported on Windows Vista, Windows 2012, Windows 7, Windows
8, Windows server 2003, and Windows server 2008 to enable Windows logon
using a VPN tunnel or enable to log in on a local machine.
8, Windows server 2003, and Windows server 2008 to enable Windows logon
using a VPN tunnel or enable to log in on a local machine.
•
Credential providers are supported on Windows Vista and Windows 7 to enable
Windows logon using a VPN tunnel or enabling logging in on a local machine.
Windows logon using a VPN tunnel or enabling logging in on a local machine.
Dead Peer Detection
Dead Peer Detection (DPD) is an IKE extension (RFC3706) for detecting a dead IKE
peer.
peer.
Redundant gateway
The redundant gateway feature provides a highly reliable secure connection to a
corporate network. The redundant gateway feature allows the VPN Client to open an
IPSec tunnel with an alternate gateway if the primary gateway is down or not
responding.
corporate network. The redundant gateway feature allows the VPN Client to open an
IPSec tunnel with an alternate gateway if the primary gateway is down or not
responding.
Mode Config
Mode Config is an IKE extension that enables the VPN gateway to provide LAN
configuration to the remote user’s machine (that is, the VPN Client). With Mode Config,
you can access all servers on the remote network by using their network name (for
example, \\myserver\marketing\budget) instead of their IP address.
configuration to the remote user’s machine (that is, the VPN Client). With Mode Config,
you can access all servers on the remote network by using their network name (for
example, \\myserver\marketing\budget) instead of their IP address.
USB drive
You can save VPN configurations and security elements (certificates, pre-shared key,
and so on) to a USB drive to remove security information (for example, user
authentication) from the computer. You can automatically open and close tunnels when
plugging in or removing the USB drive. You can attach a VPN configuration to a specific
computer or to a specific USB drive.
and so on) to a USB drive to remove security information (for example, user
authentication) from the computer. You can automatically open and close tunnels when
plugging in or removing the USB drive. You can attach a VPN configuration to a specific
computer or to a specific USB drive.
Smart card and USB
token
token
The VPN Client can read certificates from smart cards to make full use of existing
corporate ID or employee cards that carry digital credentials.
corporate ID or employee cards that carry digital credentials.
You can easily import smart card ATR codes to enable new smart card and USB token
models that are not yet in the software.
models that are not yet in the software.
Log console
All phase messages are logged for testing or staging purposes.
Flexible user
interface
interface
•
Silent install and invisible graphical interface allow network administrators to
deploy solutions while preventing user misuse of configurations.
deploy solutions while preventing user misuse of configurations.
•
Small Connection Panel and VPN Configuration Panel can be available to end
users separately with access control.
users separately with access control.
•
Drag and drop VPN configurations into the VPN Client.
•
Keyboard shortcuts to easily navigate the VPN Client.
Table 1. List of features (continued)
Feature
Specifications