User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
Index 3
E
edit 5-5, 5-27, 6-8
connections 5-5, 5-27
distinguished name 5-16
proposals 5-27
security policy 5-27
enable log file 5-3
Encapsulating Security Payload B-3
Encapsulating Security Protocol (ESP) 9-10
encapsulation methods 9-10
encryption algorithms 9-10
end secure connection manually 7-2
Enh KeyUsage 6-6
ESP B-3
ESP (Encapsulating Security Protocol) 9-10
export 6-8, 6-19, 6-24
CA certificates 6-19
certificates 6-19, 6-24
personal certificates 6-24
private key with personal certificate 6-8
RA certificates 6-19
F
firewall 5-9, 6-6
gateway devices 5-9
if protecting Internet access 6-6
freeze the Log Viewer 9-3
G
gateways 5-9
configure 5-9
DNS name 5-9
hostname 5-9
IP address 5-9
generic security policy 5-5, 5-9, 5-24
Global Policy Settings 5-3
H
hash algorithms 9-10
manual keys 9-10
HTTP proxy server 6-5, 6-6
I
IANA
contacting A-2
icon 9-2
Remove from system tray 9-2
Restore to system tray 9-2
ID types 5-5, 5-9, 5-10
My Identity 5-10
redundant gateway 5-9
remote party 5-5
Secure Gateway Tunnel 5-9
IETF A-1
Web site address A-7
IKE (Internet Key Exchange) 5-12
IKE resend retries 5-3
IKE Security Association B-4
import 5-28, 6-7, 6-15, 6-27
CA certificates 6-7
certificate files 6-7, 6-15
certificate request response file 6-15
certificates 6-7, 6-15
CRL 6-27
personal certificates 6-15
private key files 6-15
RA certificates 6-7
security policy 5-28
inbound keys 9-11
initiate secure connection manually 7-2
Internet Explorer, Microsoft 6-3, 6-18
Internet Key Exchange (IKE) B-3
Internet Protocol security B-1
Intranets B-1
IP addresses
and NAT A-8
and the Internet A-2
assigning A-2, A-9
private A-7
translating A-9
IP configuration by DHCP A-10
IPSec B-1










