Netgear FVS318Gv2 – ProSAFE VPN Firewall Series 参照マニュアル
Virtual Private Networking Using IPSec and L2TP Connections
268
NETGEAR ProSAFE VPN Firewall FVS318G v2
10.
Click the Apply button.
Your changes are saved.
Configure the ProSafe VPN Client for Mode Config Operation
When the Mode Config feature is enabled, the following information is negotiated between
the VPN client and the VPN firewall during the authentication phase:
the VPN client and the VPN firewall during the authentication phase:
•
Virtual IP address of the VPN client
•
DNS server address (optional)
•
WINS server address (optional)
The virtual IP address that is issued by the VPN firewall is displayed in the VPN Client
Address field on the VPN client’s IPSec pane.
Address field on the VPN client’s IPSec pane.
Extended Authentication
XAUTH Configuration
Note:
For more
Select whether Extended Authentication (XAUTH) is enabled, and, if enabled,
which device is used to verify user account information:
which device is used to verify user account information:
•
None. XAUTH is disabled. This the default setting.
•
Edge Device. The VPN firewall functions as a VPN concentrator on which one
or more gateway tunnels terminate. The authentication modes that are
available for this configuration are User Database, RADIUS PAP, and RADIUS
CHAP.
or more gateway tunnels terminate. The authentication modes that are
available for this configuration are User Database, RADIUS PAP, and RADIUS
CHAP.
•
IPSec Host. The VPN firewall functions as a VPN client of the remote
gateway. In this configuration, the VPN firewall is authenticated by a remote
gateway with a user name and password combination.
gateway. In this configuration, the VPN firewall is authenticated by a remote
gateway with a user name and password combination.
Authentication
Type
Type
For an Edge Device configuration, from the list, select the
authentication type:
authentication type:
•
User Database. XAUTH occurs through the VPN firewall’s
user database. You can add users on the Add User screen
(see
user database. You can add users on the Add User screen
(see
•
Radius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the VPN firewall connects to a RADIUS
server. For more information, see
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the VPN firewall connects to a RADIUS
server. For more information, see
•
Radius CHAP. XAUTH occurs through RADIUS
Challenge Handshake Authentication Protocol (CHAP).
For more information, see
Challenge Handshake Authentication Protocol (CHAP).
For more information, see
Username
The user name for XAUTH.
Password
The password for XAUTH.
Table 57. Add IKE Policy screen settings for a Mode Config configuration (continued)
Setting
Description