ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
xi
v1.0, September 2009
Testing the Connections and Viewing Status Information .............................................7-16
Testing the VPN Connection ..................................................................................7-16
NETGEAR VPN Client Status and Log Information ...............................................7-17
Viewing the UTM IPsec VPN Connection Status ...................................................7-19
Viewing the UTM IPsec VPN Log ..........................................................................7-20
Managing IPsec VPN Policies ......................................................................................7-21
Managing IKE Policies ...........................................................................................7-22
Managing VPN Policies ..........................................................................................7-30
Configuring Extended Authentication (XAUTH) ............................................................7-37
Configuring XAUTH for VPN Clients ......................................................................7-38
User Database Configuration .................................................................................7-39
RADIUS Client Configuration .................................................................................7-39
Assigning IP Addresses to Remote Users (Mode Config) ............................................7-42
Mode Config Operation ..........................................................................................7-42
Configuring Mode Config Operation on the UTM ...................................................7-42
Configuring the ProSafe VPN Client for Mode Config Operation ...........................7-49
Testing the Mode Config Connection .....................................................................7-54
Configuring Keepalives and Dead Peer Detection .......................................................7-54
Configuring Keepalives ..........................................................................................7-55
Configuring Dead Peer Connection .......................................................................7-56
Configuring NetBIOS Bridging with IPsec VPN ............................................................7-58
Chapter 8
Virtual Private Networking
Using SSL Connections
Understanding the SSL VPN Portal Options ..................................................................8-1
Using the SSL VPN Wizard for Client Configurations ....................................................8-2
SSL VPN Wizard Step 1 of 6: Portal Settings ..........................................................8-3
SSL VPN Wizard Step 2 of 6: Domain Settings .......................................................8-5
SSL VPN Wizard Step 3 of 6: User Settings ............................................................8-7
SSL VPN Wizard Step 4 of 6: Client IP Address Range and Routes .......................8-9
SSL VPN Wizard Step 5 of 6: Port Forwarding ...................................................... 8-11
SSL VPN Wizard Step 6 of 6: Verify and Save Your Settings ................................8-13
Accessing the New SSL Portal Login Screen ........................................................8-14
Viewing the UTM SSL VPN Connection Status .....................................................8-16
Viewing the UTM SSL VPN Log .............................................................................8-16
Содержание UTM10 - ProSecure Unified Threat Management Appliance
Страница 6: ...v1 0 September 2009 vi...
Страница 16: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual xvi v1 0 September 2009...
Страница 114: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual 4 28 LAN Configuration v1 0 September 2009...
Страница 464: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual E 2 Related Documents v1 0 September 2009...