vii
v1.0, October 2005
Using a Schedule to Block or Allow Specific Traffic ......................................................5-17
Time Zone ..............................................................................................................5-18
Getting E-Mail Notifications of Event Logs and Alerts ..................................................5-19
Viewing Logs of Web Access or Attempted Web Access .............................................5-21
Syslog ....................................................................................................................5-22
Chapter 6
Basic Virtual Private Networking
Overview of VPN Configuration ......................................................................................6-2
Client-to-Gateway VPN Tunnels ..............................................................................6-2
Gateway-to-Gateway VPN Tunnels .........................................................................6-3
Planning a VPN ..............................................................................................................6-3
VPN Tunnel Configuration ..............................................................................................6-5
How to Set Up a Client-to-Gateway VPN Configuration .................................................6-5
Step 1: Configuring the Client-to-Gateway VPN Tunnel on the FVG318 .................6-6
Step 2: Configuring the NETGEAR ProSafe VPN Client on the Remote PC .........6-10
Monitoring the Progress and Status of the VPN Client Connection .......................6-18
Transferring a Security Policy to Another Client ....................................................6-19
How to Set Up a Gateway-to-Gateway VPN Configuration ..........................................6-22
Procedure to Configure a Gateway-to-Gateway VPN Tunnel ................................6-22
VPN Tunnel Control ......................................................................................................6-29
Activating a VPN Tunnel ........................................................................................6-29
Verifying the Status of a VPN Tunnel .....................................................................6-32
Deactivating a VPN Tunnel ....................................................................................6-33
Deleting a VPN Tunnel ...........................................................................................6-36
Chapter 7
Advanced Virtual Private Networking
Overview of FVG318 Policy-Based VPN Configuration .................................................7-1
Using Policies to Manage VPN Traffic .....................................................................7-1
Using Automatic Key Management ..........................................................................7-2
IKE Policies’ Automatic Key and Authentication Management ................................7-3
VPN Policy Configuration for Auto Key Negotiation .................................................7-6
VPN Policy Configuration for Manual Key Exchange ...............................................7-9
Using Digital Certificates for IKE Auto-Policy Authentication .......................................7-14
Certificate Revocation List (CRL) ...........................................................................7-14
Walk-Through of Configuration Scenarios on the FVG318 ..........................................7-14