NETGEAR UTM5-100NAS Network Hardware User Manual


 
7-1
v1.0, January 2010
Chapter 7
Virtual Private Networking
Using IPsec Connections
This chapter describes how to use the IP security (IPsec) virtual private networking (VPN) features
of the UTM to provide secure, encrypted communications between your local network and a
remote network or computer. This chapter contains the following sections:
“Considerations for Dual WAN Port Systems (Dual-WAN Port Models Only)” on this page.
“Using the IPsec VPN Wizard for Client and Gateway Configurations” on page 7-3.
“Testing the Connections and Viewing Status Information” on page 7-17.
“Managing IPsec VPN Policies” on page 7-22.
“Configuring Extended Authentication (XAUTH)” on page 7-38.
“Assigning IP Addresses to Remote Users (Mode Config)” on page 7-43.
“Configuring Keepalives and Dead Peer Detection” on page 7-55.
“Configuring NetBIOS Bridging with IPsec VPN” on page 7-59.
Considerations for Dual WAN Port Systems (Dual-WAN Port
Models Only)
On the dual-WAN port models only, if both of the WAN ports are configured, you can enable
either auto-rollover mode for increased system reliability or load balancing mode for optimum
bandwidth efficiency. Your WAN mode selection impacts how the VPN features must be
configured.
The use of fully qualified domain names (FQDNs) in VPN policies is mandatory when the WAN
ports function in auto-rollover mode or load balancing mode, and is also required for VPN tunnel
failover. When the WAN ports function in load balancing mode, you cannot configure VPN tunnel
failover. A FQDN is optional when the WAN ports function in load balancing mode if the IP
addresses are static but mandatory if the WAN IP addresses are dynamic.