Virtual Private Networking Using IPv4 IPSec and L2TP Connections
186
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
4. Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.
To edit an IKE policy:
1. Select VPN > IPSec VPN. The IPSec VPN subme
nu tabs display with the IKE Policies
screen in view (see Figure 110 on
page 180).
2. In the List of IKE Policies
table, click the Edit table button to the right of the IKE policy that
you want to edit. The Edit IKE Policy screen displays. This screen shows the same fields as
the Add IKE Policy screen (see Figure 111 o
n page 182).
3. Modif
y the settings that you wish to change (see the previous table).
4. Click Apply
to save your changes. The modified IKE policy is displayed in the List of IKE
Policies table.
Extended Authentication
XAUTH Configuration
Note: For more
in
formation about
XAUTH and its
authentication modes,
see Configure XAUTH
for VPN Clients on
page 195.
Select one of the following radio button
s to specify whether or not Extended
Authentication (XAUTH) is enabled, and, if enabled, which device is used to verify
user account information:
• None. XAUTH
is disabled. This the default setting.
• Edge Device. The wireless VPN firewall functions as a VPN concentrator on
which one or more gateway tunnels terminate. The authentication modes that
are available for this configuration are User Database, RADIUS PAP, or RADIUS
CHAP.
• IPSec H
ost. The wireless VPN firewall functions as a VPN client of the remote
gateway. In this configuration the wireless VPN firewall is authenticated by a
remote gateway with a user name and password combination.
Authentication
Ty
pe
For an Edge Device configuration, from the drop-down list,
select one of the following authentication types:
• User
Database. XAUTH occurs through the wireless VPN
firewall’s user database. You can add users on the Add
User screen (see User Database Configuration on
page 196).
• Ra
dius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the wireless VPN firewall connects to a
RADIUS server. For more information, see RADIUS Client
Configuration on p
age 196.
• Ra
dius CHAP. XAUTH occurs through RADIUS Challenge
Handshake Authentication Protocol (CHAP). For more
information, see RADIUS Client Configuration on
page 196.
Username The user name for XAUTH.
Password The password for XAUTH.
Table 44. Add IKE Policy screen settings (continued)
Setting Description