NETGEAR ProSafe FVS124G User Manual

Page 13

Advertising
background image

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports

-7

202-10085-01, March 2005

MacOS X ............................................................................................................... C-16

Verifying TCP/IP Properties for Macintosh Computers ......................................... C-17

Verifying the Readiness of Your Internet Account ....................................................... C-18

Are Login Protocols Used? ................................................................................... C-18

What Is Your Configuration Information? .............................................................. C-18

Obtaining ISP Configuration Information for Windows Computers ....................... C-19

Obtaining ISP Configuration Information for Macintosh Computers ..................... C-20

Restarting the Network ................................................................................................ C-21

Appendix D

Virtual Private Networking

What is a VPN? ............................................................................................................. D-1

What Is IPSec and How Does It Work? ......................................................................... D-2

IPSec Security Features ......................................................................................... D-2

IPSec Components ................................................................................................. D-2

Encapsulating Security Payload (ESP) ................................................................... D-3

Authentication Header (AH) .................................................................................... D-4

IKE Security Association ......................................................................................... D-4

Mode ................................................................................................................. D-5

Key Management .................................................................................................... D-6

Understand the Process Before You Begin ................................................................... D-6

VPN Process Overview ................................................................................................. D-7

Network Interfaces and Addresses ......................................................................... D-7

Interface Addressing ......................................................................................... D-7

Firewalls ........................................................................................................... D-8

Setting Up a VPN Tunnel Between Gateways ........................................................ D-8

VPNC IKE Security Parameters .................................................................................. D-10

VPNC IKE Phase I Parameters ............................................................................. D-10

VPNC IKE Phase II Parameters ............................................................................ D-11

Testing and Troubleshooting ........................................................................................ D-11

Additional Reading ...................................................................................................... D-11

Glossary

List of Glossary Terms ........................................................................................Glossary-1

Numeric ..............................................................................................................Glossary-1

A .........................................................................................................................Glossary-2

B .........................................................................................................................Glossary-2

Advertising