EasyManuals Logo
Home>NETGEAR>Firewall>UTM5

NETGEAR UTM5 User Manual

NETGEAR UTM5
645 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #291 background imageLoading...
Page #291 background image
Virtual Private Networking Using IPSec Connections
291
ProSecure Unified Threat Management (UTM) Appliance
Configure XAUTH for VPN Clients
Once the XAUTH has been enabled, you need to establish user accounts in the user
database to be authenticated against XAUTH, or you need to enable a RADIUS-CHAP or
RADIUS-PAP server.
Note: You cannot modify an existing IKE policy to add XAUTH while the
IKE policy is in use by a VPN policy. The VPN policy needs to be
disabled before you can modify the IKE policy.
 To enable and configure XAUTH:
1. Select VPN > IPSec VPN. The IPSec VPN submenu tabs display with the IKE Policies
screen in view (see Figure 171 on page 275).
2. In the List of IKE Policies table, click the Edit table button to the right of the IKE policy for
which you want to enable and configure XAUTH. The Edit IKE Policy screen displays. This
screen shows the same fields as the Add IKE Policy screen (see Figure 172 on page 277).
3. In the Extended Authentication section onscreen, complete the fields, select the radio
buttons, and make your selections from the drop-down lists as explained in the following
table:
4. Click Apply to save your settings.
Table 70. Extended authentication settings
Setting Description
Select one of the following radio buttons to specify whether or not Extended Authentication (XAUTH) is
enabled, and, if enabled, which device is used to verify user account information:
• None. XAUTH is disabled. This the default setting.
• Edge Device. The UTM functions as a VPN concentrator on which one or more gateway tunnels
terminate. The authentication modes that are available for this configuration are User Database,
RADIUS PAP, and RADIUS CHAP.
• IPSec Host. The UTM functions as a VPN client of the remote gateway. In this configuration the UTM
is authenticated by a remote gateway with a user name and password combination.
Authentication
Type
For an Edge Device configuration, from the drop-down list, select one of the following
authentication types:
• User Database. XAUTH occurs through the UTM’s user database. You can add
users on the Add User screen (see User Database Configuration on page 292).
• Radius PAP. XAUTH occurs through RADIUS Password Authentication Protocol
(PAP). The local user database is first checked. If the user account is not present
in the local user database, the UTM connects to a RADIUS server. For more
information, see RADIUS Client Configuration on page 292.
• Radius CHAP. XAUTH occurs through RADIUS Challenge Handshake
Authentication Protocol (CHAP). For more information, see RADIUS Client
Configuration on page 292.
Username The user name for XAUTH.
Password The password for XAUTH.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the NETGEAR UTM5 and is the answer not in the manual?

NETGEAR UTM5 Specifications

General IconGeneral
BrandNETGEAR
ModelUTM5
CategoryFirewall
LanguageEnglish

Related product manuals