User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
Reference Manual for the NETGEAR ProSafe VPN Client
5-22 Using the Security Policy Editor
202-10015-01
Copy a Proposal
You can copy proposals for Authentication (Phase 1) or Key Exchange (Phase 2) in the selected
connection only. You cannot copy proposals to another phase or connection.
1. In the Security Policy Editor, in the Network Security Policy list, expand a secure connection
.
2. Expand Security Policy for the secure connection. Authentication (Phase 1) and Key
Exchange (Phase 2) appear.
3. Depending on the type of proposal you want to copy, click a proposal for Authentication
(Phase 1) or Key Exchange (Phase 2) that you want to copy.
4. Click . The new proposal appears below the copied proposal; its number is the copied
proposal incremented by one. Each proposal's number below the new one is incremented by
one from before the copy operation. Proposal labels are fixed; you can't change them.
Example:
There are four proposals for a connection. You copied Proposal 2; the new proposal is
Proposal 3. Proposals 3 and 4 are now Proposals 4 and 5.
5. Click Save.
Move a Proposal
The client attempts proposals in the order they are listed, in the particular phase for a connection,
in the Network Security Policy list. To change the selection order, you can move a proposal up or
down.
When you change a proposal's position in the list, the client renumbers the proposals to maintain
sequential numbering. When you have finished moving proposals, make sure that the proposals are
in the order you want them tried.
1. In the Security Policy Editor, in the Network Security Policy list, expand the specific secure
connection .
2. For this secure connection, expand Security Policy.
3. Depending on the location of the proposal to move, expand Authentication (Phase 1) or Key
Exchange (Phase 2).
4. Click the proposal to move.
5. Click to move the proposal up or to move it down.










