NETGEAR FWG114P v2 Printer User Manual


 
Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P v2
Virtual Private Networking 8-15
201-10301-02, May 2005
Walk-Through of Configuration Scenarios on the FWG114P
v2
There are a variety of configurations you might implement with the FWG114P v2. The scenarios
listed below illustrate typical configurations you might use in your organization.
In order to help make it easier to set up an IPsec system, the following two scenarios are provided.
These scenarios were developed by the VPN Consortium (http://www.vpnc.org). The goal is to
make it easier to get the systems from different vendors to interoperate. NETGEAR is providing
you with both of these scenarios in the following two formats:
VPN Consortium Scenarios without Any Product Implementation Details as presented in
“VPNC Scenario 1: Gateway to Gateway with Preshared Secrets” on page 8-19 and “VPNC
Scenario 2: Gateway-to-Gateway with Certificates” on page 8-25.
VPN Consortium Scenarios Based on the FWG114P v2 User Interface as presented in
“Scenario 1: FWG114P v2 to FWG114P v2 with Preshared Secrets” on page 8-20 and
“Scenario 2: FWG114P v2 to FWG114P v2 with Certificates” on page 8-26.
The purpose of providing these two versions of the same scenarios is to help you determine where
the two vendors use different vocabulary. Seeing the examples presented in these different ways
will reveal how systems from different vendors do the same thing.
How to Use the VPN Wizard to Configure a VPN Tunnel
Follow this procedure to configure a VPN tunnel using the VPN Wizard.
Note: The LAN IP address ranges of each VPN endpoint must be different. The connection will
fail if both are using the NETGEAR default address range of 192.168.0.x.
1. Log in to the FVS318 on LAN A at its default LAN address of http://192.168.0.1 with its
default user name of
admin and password of password. Click the VPN Wizard link in the
main menu to display this screen. Click Next to proceed.
Note: If you have turned NAT off, before configuring VPN IPSec tunnels you must first
open UDP port 500 for inbound traffic as explained in “Example: Port Forwarding for
VPN Tunnels when NAT is Off” on page 6-8.