Netgear 12300211 用户手册
Virtual Private Networking
124
N300 Wireless ADSL2+ Modem Router DGN2200v4
Delete a VPN Tunnel
To deactivate a VPN tunnel:
1.
Select Advanced > Advanced - VPN > VPN Policies to display the VPN Policies
screen.
2.
In the Policy Table, select the radio button for the VPN tunnel to be deleted and click Delete.
Set Up VPN Tunnels in Special Circumstances
for your circumstances, use one of these alternatives:
•
Auto Policy
124. Auto Policy uses the IKE protocol to
define the authentication scheme and automatically generate the encryption keys.
•
Manual Policy
. For a manual keying setup in which you have to specify each phase of
the connection, see
policy does not use IKE. Rather, you manually enter all the authentication and key
parameters. You have more control over the process; however, the process is more
complex, and there are more opportunities for errors or configuration mismatches
between your DGN2200v4 and the corresponding VPN endpoint gateway or client
workstation.
parameters. You have more control over the process; however, the process is more
complex, and there are more opportunities for errors or configuration mismatches
between your DGN2200v4 and the corresponding VPN endpoint gateway or client
workstation.
Use Auto Policy to Configure VPN Tunnels
You need to configure matching VPN settings on both VPN endpoints. The outbound VPN
settings on one end have to match to the inbound VPN settings on other end, and vice versa.
settings on one end have to match to the inbound VPN settings on other end, and vice versa.
See
Configure VPN Network Connection Parameters
All VPN tunnels on the modem router require that you configure several network parameters.
This section describes those parameters and how to access them.
The most common configuration scenarios use IKE to manage the authentication and
encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to
generate and update the required encryption parameters.
encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to
generate and update the required encryption parameters.