Page 116 / 240 Scroll up to view Page 111 - 115
ProSafe VPN Firewall 200 FVX538 Reference Manual
5-12
Virtual Private Networking
v1.0, March 2009
Testing the Connections and Viewing Status Information
Both the NETGEAR VPN Client and the FVX538 provide VPN connection and status
information. This information is useful for verifying the status of a connection and troubleshooting
problems with a connection.
NETGEAR VPN Client Status and Log Information
To test a client connection and view the status and log information, follow these steps.
1.
To test the client connection, from your PC, right-click on the VPN client icon in your
Windows toolbar and choose
Connect...
, then
My Connections\gw1
.
Within 30 seconds you should receive the message “Successfully connected to My
Connections\gw1”.
The VPN client icon in the system tray should say On:
Figure 5-14
Figure 5-15
Page 117 / 240
ProSafe VPN Firewall 200 FVX538 Reference Manual
Virtual Private Networking
5-13
v1.0, March 2009
2.
To view more detailed additional status and troubleshooting information from the NETGEAR
VPN client, follow these steps.
Right-click the VPN Client icon in the system tray and select Log Viewer.
Right-click the VPN Client icon in the system tray and select Connection Monitor.
Figure 5-16
Figure 5-17
Page 118 / 240
ProSafe VPN Firewall 200 FVX538 Reference Manual
5-14
Virtual Private Networking
v1.0, March 2009
The VPN client system tray icon provides a variety of status indications, which are listed below.
FVX538 VPN Connection Status and Logs
To view FVX538 VPN connection status, go to
VPN > Connection Status
.
Table 5-2.
System Tray Icon
Status
The client policy is deactivated.
The client policy is deactivated but not connected.
The client policy is activated and connected.
A flashing vertical bar indicates traffic on the tunnel.
Figure 5-18
Page 119 / 240
ProSafe VPN Firewall 200 FVX538 Reference Manual
Virtual Private Networking
5-15
v1.0, March 2009
To view FVX538 VPN logs, go to
Monitoring > VPNLogs
.
VPN Tunnel Policies
When you use the VPN Wizard to set up a VPN tunnel, both a VPN Policy and an IKE Policy are
established and populated in both Policy Tables. The name you selected as the VPN Tunnel
connection name during Wizard setup identifies both the VPN Policy and IKE Policy. You can edit
existing policies, or add new VPN and IKE policies directly in the Policy Tables.
IKE Policy
The IKE (Internet Key Exchange) protocol performs negotiations between the two VPN
Gateways, and provides automatic management of the Keys used in IPSec. It is important to
remember that:
“Auto” generated VPN policies must use the IKE negotiation protocol.
“Manual” generated VPN policies cannot use the IKE negotiation protocol.
Managing IKE Policies
IKE Policies are activated when:
1.
The VPN Policy Selector determines that some traffic matches an existing VPN Policy. If the
VPN policy is of type “Auto”, then the
Auto Policy Parameters
defined in the VPN Policy
are accessed which specify which IKE Policy to use.
Figure 5-19
Page 120 / 240
ProSafe VPN Firewall 200 FVX538 Reference Manual
5-16
Virtual Private Networking
v1.0, March 2009
2.
If the VPN Policy is a “Manual” policy, then the
Manual Policy Parameters
defined in the
VPN Policy are accessed and the first matching IKE Policy is used to start negotiations with
the remote VPN Gateway.
If negotiations fail, the next matching IKE Policy is used.
If none of the matching IKE Policies are acceptable to the remote VPN Gateway, then a
VPN tunnel cannot be established.
3.
An IKE session is established, using the SA (Security Association) parameters specified in a
matching IKE Policy:
Keys and other parameters are exchanged.
An IPSec SA (Security Association) is established, using the parameters in the VPN
Policy.
The VPN tunnel is then available for data transfer.
IKE Policy Table
When you use the VPN Wizard to set up a VPN tunnel, an IKE Policy is established and populated
in the Policy Table and is given the same name as the new VPN connection name. You can also
edit exiting policies or add new IKE policies directly on the Policy Table Screen. Each policy
contains the following data:
Name
. Uniquely identifies each IKE policy. The name is chosen by you and used for the
purpose of managing your policies; it is not supplied to the remote VPN Server.
Mode
. Two modes are available: either “Main” or “Aggressive”.
Main Mode is slower but more secure.
Aggressive mode is faster but less secure. (If specifying either a FQDN or a User FQDN
name as the Local ID/Remote ID, aggressive mode is automatically selected.)
Local ID
. The IKE/ISAKMP identify of this device. (The remote VPN must have this value as
their “Remote ID”.)
Remote ID
. The IKE/ISAKMP identify of the remote VPN Gateway. (The remote VPN must
have this value as their “Local ID”.)
Encr
. Encryption Algorithm used for the IKE SA. The default setting using the VPN Wizard is
3DES. (This setting must match the Remote VPN.)
Auth
. Authentication Algorithm used for the IKE SA. The default setting using the VPN
Wizard is SHA1. (This setting must match the Remote VPN.)

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top