User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
2 Index
delete 6-11
prepare a personal certificate file to import 6-14
view 6-11
certificates 6-2, 6-3, 6-4, 6-5, 6-7, 6-15, 6-19, 6-20,
6-24
create certificate request files 6-8
delete 6-20
description 6-2
export 6-19, 6-24
import 6-7, 6-15
RA 6-4
retrieve 6-5, 6-10
save when uninstalling 3-4
verify 6-19
connect to a secure session 7-1, 7-2
automatic 7-1
manually 7-2
Connection Monitor C-14, D-17
connections 5-5, 5-20, 5-21, 5-27
add 5-5
configure 5-4, 5-5
copy 5-20
create multiple 5-5
delete 5-21
edit 5-27
move 5-20
rename 5-20
secure 5-4
security level 5-5
copy 5-20, 5-22, 5-25
connections 5-20
proposal 5-22
redundant gateway 5-25
create 5-5
certificate request files 6-8
generic security policy 5-5, 5-9, 5-24
multiple connections 5-5
proposal 5-21
redundant gateway 5-24
CRL (certificate revocation list) 6-27, 6-28
delete 6-28
import 6-27
update 6-27
view 6-28
CSP (Cryptographic Service Provider) 6-3, 6-8
configure 6-8
Microsoft 6-3
set default 6-8
customer support 1-ii
D
deactivate security policy 5-29
delete 5-21, 5-23, 5-26, 6-11, 6-20, 6-28, 9-2
CA certificate 6-20
certificate 6-20
certificate request 6-11
certificate revocation list (CRL) 6-28
connection 5-21
icon 9-2
personal certificate 6-20
proposal 5-23
RA certificate 6-20
redundant gateway 5-26
root CA certificate 6-20
denial of service attack A-11
DES 9-10
DHCP A-10
diagnostics 9-10
manual keys 9-10
Diffie-Hellman groups 9-10
digital IDs 6-18
disable 5-26, 5-29, 9-13
manual connections 5-5
manual keys 9-13
redundant gateways 5-26
security policy 5-29
disconnect all 5-28
disconnect secure session 7-1, 7-2
automatic 7-1
manual 7-2
distinguished name 5-16, 5-31, 6-8
edit 5-16
ID type 5-5, 5-9, 5-10
LDAP format 5-16
register with a VPN policy manager 5-31
request a personal certificate online 6-8
domain name server (DNS) A-9
DoS attack A-11










