Netgear FVS318N – Prosafe Wireless N VPN Firewall 参照マニュアル
Virtual Private Networking Using IPSec and L2TP Connections
229
ProSAFE Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Authentication Method
Select one of the following radio buttons to specify the authentication method:
•
Pre-shared key. A secret that is shared between the wireless VPN firewall
and the remote endpoint.
and the remote endpoint.
•
RSA-Signature. Uses the active self-signed certificate that you uploaded on
the Certificates screen (see
the Certificates screen (see
319). The pre-shared key is masked out when you select
RSA-Signature.
Pre-shared key
A key with a minimum length of 8 characters and no more
than 49 characters. Do not use a double quote (''), single
quote('), or space in the key.
quote('), or space in the key.
Diffie-Hellman (DH)
Group
Group
The DH Group sets the strength of the algorithm in bits. The higher the group, the
more secure the exchange. From the drop-down list, select one of the following
three strengths:
more secure the exchange. From the drop-down list, select one of the following
three strengths:
•
Group 1 (768 bit).
•
Group 2 (1024 bit). This is the default setting.
•
Group 5 (1536 bit).
Note:
Ensure that the DH Group is configured identically on both sides.
SA-Lifetime (sec)
The period in seconds for which the IKE SA is valid. When the period times out,
the next rekeying occurs. The default is 28800 seconds (eight hours).
the next rekeying occurs. The default is 28800 seconds (eight hours).
Enable Dead Peer
Detection
Detection
Note:
See also
Select a radio button to specify whether Dead Peer Detection (DPD) is enabled:
•
Yes. This feature is enabled. When the wireless VPN firewall detects an IKE
connection failure, it deletes the IPSec and IKE SA and forces a
reestablishment of the connection. You need to specify the detection period in
the Detection Period field and the maximum number of times that the wireless
VPN firewall attempts to reconnect in the Reconnect after failure count field.
connection failure, it deletes the IPSec and IKE SA and forces a
reestablishment of the connection. You need to specify the detection period in
the Detection Period field and the maximum number of times that the wireless
VPN firewall attempts to reconnect in the Reconnect after failure count field.
•
No. This feature is disabled. This is the default setting.
Detection Period
The period in seconds between consecutive
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle.
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle.
Reconnect after
failure count
failure count
The maximum number of DPD failures before the wireless
VPN firewall tears down the connection and then attempts to
reconnect to the peer. The default is three failures.
VPN firewall tears down the connection and then attempts to
reconnect to the peer. The default is three failures.
Table 52. Add IKE Policy screen settings (continued)
Setting
Description