User's Manual
Table Of Contents
- Reference Manual for the NETGEAR ProSafe VPN Client
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Installation
- Chapter 4 Configuring L2TP Connections
- Chapter 5 Using the Security Policy Editor
- What is the Security Policy Editor?
- Basic Steps to Configure a Security Policy
- How to Secure All Connections
- How to Configure Global Policy Settings
- How to Configure Other Connections
- How to Add and Configure a Connection
- How to Enter a Preshared Key
- How to Configure a Gateway
- Configure My Identity
- Configure Security Policy Connection Options
- Configure Authentication (Phase 1)
- Configure Key Exchange (Phase 2)
- Edit a Distinguished Name
- Configure and Manage Connections
- Manage Proposals
- Manage Redundant Gateways
- Manage the Security Policy
- Chapter 6 Using the Certificate Manager
- What is the Certificate Manager?
- Obtain Certificates
- With Online (SCEP) Enrollment
- CAs that Support SCEP
- Retrieve a CA Certificate Online
- Configure a CA Certificate
- Use an HTTP Proxy Server for Online Certificate Requests and CRL Updates
- Import a CA Certificate
- Select a CSP
- Request a Personal Certificate
- Define How Often to Check for and Retrieve New Personal Certificates
- Retrieve a Personal Certificate Manually
- Manage Certificate Requests
- With Manual (File-Based) Enrollment
- Obtain Certificates Through Internet Explorer
- With Online (SCEP) Enrollment
- Manage Certificates
- Manage Certificate Revocation Lists (CRLs)
- Manage the Trust Policy
- Chapter 7 Using Sessions
- Chapter 8 Distributing Customized Profiles
- Chapter 9 Troubleshooting
- Appendix A Networks, Routing, and Firewall Basics
- Appendix B Virtual Private Networking
- Appendix C NETGEAR ProSafe VPN Client to NETGEAR FVS318 or FVM318 VPN Routers
- Appendix D NETGEAR VPN Client to NETGEAR FVL328 or FWAG114 VPN Router
- Glossary
- Index
202-10015-01M-10207-01, Reference Manual v2
iv Contents
Chapter 5
Using the Security Policy Editor
What is the Security Policy Editor? .................................................................................5-1
Basic Steps to Configure a Security Policy .....................................................................5-1
How to Secure All Connections ......................................................................................5-2
How to Configure Global Policy Settings ........................................................................5-3
How to Configure Other Connections .............................................................................5-4
How to Add and Configure a Connection .......................................................................5-5
How to Enter a Preshared Key .......................................................................................5-8
How to Configure a Gateway ..........................................................................................5-9
Configure My Identity ....................................................................................................5-10
Configure Security Policy Connection Options .............................................................5-12
Configure Authentication (Phase 1) ..............................................................................5-13
Configure Key Exchange (Phase 2) .............................................................................5-14
Edit a Distinguished Name ...........................................................................................5-16
Configure and Manage Connections ............................................................................5-17
Add and Configure a Connection ...........................................................................5-17
Copy a Connection .................................................................................................5-20
Move a Connection ................................................................................................5-20
Rename a Connection ...........................................................................................5-20
Delete a Connection ...............................................................................................5-21
Manage Proposals ........................................................................................................5-21
Add a Proposal .......................................................................................................5-21
Copy a Proposal .....................................................................................................5-22
Move a Proposal ....................................................................................................5-22
Delete a Proposal ...................................................................................................5-23
Manage Redundant Gateways .....................................................................................5-23
Add a Redundant Gateway ....................................................................................5-24
Copy a Redundant Gateway ..................................................................................5-25
Move a Redundant Gateway ..................................................................................5-25
Rename a Redundant Gateway .............................................................................5-25
Delete a Redundant Gateway ................................................................................5-26
Disable Redundant Gateways ................................................................................5-26
Manage the Security Policy ..........................................................................................5-26
Edit a Security Policy .............................................................................................5-27










