Quick Reference Guide

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Virtual Private Networking Using IPsec 5-19
v1.0, January 2010
Only one client policy may configured at a time (noted by an “*” next to the policy name). The
List of VPN Policies table contains the following fields:
! (Status). Indicates whether the policy is enabled (green circle) or disabled (grey circle). To
Enable or Disable a Policy, check the box adjacent to the circle and click Enable or Disable,
as required.
Name. Each policy is given a unique name (the Connection Name when using the VPN
Wizard).
Type. The type is “Auto” or “Manual” as described previously (Auto is used during VPN
Wizard configuration).
Local. IP address (either a single address, range of address or subnet address) on your local
LAN. Traffic must be from (or to) these addresses to be covered by this policy. (The subnet
address is supplied as the default IP address when using the VPN Wizard).
Remote. IP address or address range of the remote network. Traffic must be to (or from) these
addresses to be covered by this policy. (The VPN Wizard default requires the remote LAN IP
address and subnet mask).
Auth. Authentication Algorithm used for the VPN tunnel. The default setting using the VPN
Wizard is SHA1. (This setting must match the remote VPN.)
Encr. Encryption algorithm used for the VPN tunnel. The default setting using the VPN
Wizard is 3DES. (This setting must match the remote VPN.)
Action. Allows you to access individual policies to make any changes or modifications.
Configuring Extended Authentication (XAUTH)
When connecting many VPN clients to a VPN firewall, an administrator may want a unique user
authentication method beyond relying on a single common preshared key for all clients. Although
the administrator could configure a unique VPN policy for each user, it is more convenient for the
VPN firewall to authenticate users from a stored list of user accounts. XAUTH provides the
mechanism for requesting individual authentication information from the user, and a local User
Database or an external authentication server, such as a RADIUS server, provides a method for
storing the authentication information centrally in the local network.