Netgear UTM9S – ProSECURE Unified Threat Management (UTM) Appliance with DSL and Wireless modules Manual De Referência
Virtual Private Networking Using IPSec Connections
299
ProSecure Unified Threat Management (UTM) Appliance
Figure 182.
3.
In the IKE SA Parameters section of the screen, locate the DPD fields, and complete the
fields as explained the following table:
fields as explained the following table:
4.
Click Apply to save your settings.
Configure NetBIOS Bridging with IPSec VPN
Windows networks use the Network Basic Input/Output System (NetBIOS) for several basic
network services such as naming and neighborhood device discovery. Because VPN routers
do not usually pass NetBIOS traffic, these network services do not function for hosts on
opposite ends of a VPN connection. To solve this problem, you can configure the UTM to
bridge NetBIOS traffic over the VPN tunnel.
network services such as naming and neighborhood device discovery. Because VPN routers
do not usually pass NetBIOS traffic, these network services do not function for hosts on
opposite ends of a VPN connection. To solve this problem, you can configure the UTM to
bridge NetBIOS traffic over the VPN tunnel.
To enable NetBIOS bridging on a configured VPN tunnel:
1.
Select VPN > IPSec VPN > VPN Policies. The VPN Policies screen displays (see
Table 75. Dead peer Detection settings
Setting
Description
IKE SA Parameters
Enable Dead Peer
Detection
Detection
Select the Yes radio button to enable DPD. When the UTM detects an IKE
connection failure, it deletes the IPSec and IKE SA and forces a reestablishment
of the connection. You need to specify the detection period in the Detection
Period field and the maximum number of times that the UTM attempts to
reconnect in the Reconnect after failure count field.
connection failure, it deletes the IPSec and IKE SA and forces a reestablishment
of the connection. You need to specify the detection period in the Detection
Period field and the maximum number of times that the UTM attempts to
reconnect in the Reconnect after failure count field.
Detection Period
The period in seconds between consecutive
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle. The default setting is 10 seconds.
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle. The default setting is 10 seconds.
Reconnect after
failure count
failure count
The maximum number of DPD failures before the UTM tears
down the connection and then attempts to reconnect to the
peer. The default setting is 3 failures.
down the connection and then attempts to reconnect to the
peer. The default setting is 3 failures.