NETGEAR UTM5-100NAS Network Hardware User Manual


 
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
7-32 Virtual Private Networking Using IPsec Connections
v1.0, January 2010
2. Click the VPN Policies submenu tab. The VPN Policies screen displays. (Figure 7-22 shows
some examples.)
Each policy contains the data that are explained in Table 7-11. These fields are explained in
more detail in Table 7-12 on page 7-35.
Figure 7-22
Table 7-11. List of VPN Policies Information
Item Description (or Subfield and Description)
! (Status) Indicates whether the policy is enabled (green circle) or disabled (grey circle). To
enable or disable a policy, select the checkbox adjacent to the circle and click
the Enable or Disable table button, as required.
Name The name that identifies the VPN policy. When you use the VPN Wizard to
create a VPN policy, the name of the VPN policy (and of the automatically
created accompanying IKE policy) is the Connection Name.
Type “Auto” or “Manual” as described previously (Auto is used during VPN Wizard
configuration).
Local IP address (either a single address, range of address or subnet address) on your
local LAN. Traffic must be from (or to) these addresses to be covered by this
policy. (The subnet address is supplied as the default IP address when using the
VPN Wizard).
Remote IP address or address range of the remote network. Traffic must be to (or from)
these addresses to be covered by this policy. (The VPN Wizard default requires
the remote LAN IP address and subnet mask).
Auth The authentication algorithm that is used for the VPN tunnel. This setting must
match the setting on the remote endpoint.
Encr The encryption algorithm that is used for the VPN tunnel. This setting must
match the setting on the remote endpoint.