NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
VPN
39 TopicsFVS318v3 slow speeds as Router fast as Hub what settings can I change (internally on netgear)
My FVS 318 v3 is only 7 & 8 Mbps as a Router but it speeds up to (94 & 67 Mbps when modem cable is moved from WAN to a LAN port. what inside the Netgear is slowing down speed. No Port Fwrd, no Rules, no VPN, just basic AUTO setup.32Views0likes2CommentsL2TP AD integration and DH key length
L2TP with IPSEC is for sure easy to setup, but even more convenient would be to use Active Directory authentication, such as one for SSL VPN and admin role setup. Windows internal VPN client offers domain credentials as on option for authentication, that would ease the setup. Of course there would be need for group membership checking or explicitly define, which users are allowed to login. Also, DH should allow use of 2048-bit keys.15KViews1like1CommentZeroTier and the ReadyNAS
NASTools mentions in the Apps sub-forum that he is looking into an app for ZeroTier. I started a small tangent discussion and thought it better to move it to its own thread. I. too, have been looking into ZeroTier, and I think it has great potential on the ReadyNAS. For those open to SSHing in, it's an easy install in OS6.6.0. But everything has to be done via SSH and the ZeroTier CLI, so it's not for everyone (yet). If NASTools does get an app with a GUI, then all aboard. I suppose ShellInABox could also be used, since it gives SSH access -- I have never tried it. I have installed ZeroTier One (the official name of the application) on OS6.6.0 running on legacy x86 devices. With OS6.6 now being based on Debian 8 (aka jessie), it should also install on ARM devices using the standard method, according to their documentation. But I do not have an ARM device on which to try it. Anyone wishing to risk the possibility of needing to factory default if it does not work right is invited to give it a try (see instructions below) and let us know in a reply if it works. So, "What is ZeroTier?", you ask. The best desctiption I have seen is that is it a "mesh VPN". That is, it is a VPN that runs in conjunction with your normal NAT, not instead or in the middle of it. Instead of routing everything over the VPN, as is the typical VPN implementation (though it can be made to do so), it sets up one or more parallel networks that you can access through ZeroTier. You can find more information at https://www.zerotier.com/. I have installed it on two ReadyNASes, a PC, and my Android phone. I can now directly access the NASes (including the admin page) from my PC or phone when away from home as if I were on the same LAN (though my phone's resolution and the OS6 user interface don't work well together). I can map drives on my PC. I can create a backup job between NASes, even if they are in physically different locations. No need for Rsync over SSH, ReadyCloud or ReadyNAS Replicate. Just a standard backup process using the other NAS's ZeroTier IP address instead of it's normal one. For me, this is huge. It's a lot like ReadyNAS Remote and then some. Like the ReadyNAS apps, it does use an external server to establish the route between devices, but it does not route all traffic though that server. As a result, it's only bottleneck is the connection speeds of the devices There is an option to run your own server, though documentation is sparce (likely intentionally, as doing so is only for highly skilled users). Because traffic takes the most direct route, including staying on your LAN if appropriate, this also means you can use the same Windows drive mappings no matter where you are. When both devices are on your LAN, speed does not suffer by being routed "around the world". But your internet traffic also doesn't suffer when you are on the road by being routed through your VPN gateway. Note that this could open a remote PC up as an attrack point on the LAN, so caution should be used by business users. Having the ZeroTier connection made automatically with stored credentials is probably not wise for many cases. I was initially reluctant to install ZeroTier because it just used a script and I could not see what it was doing. But I downloaded and looked over the script and became convinced it would work. And work, it did. Just go here: https://www.zerotier.com/product-one.shtml and run the CURL command listed for the Linux install from an SSH session. I point to the page instead of duplicating the command in case it changes in the future. I did run an apt-get update first, because I think the system should be up to date before installing any "foreign" apps, but Netgear does not recommend doing the update, as it may create conflicts within the OS. The script checks what version of Linux and what processor you are using, then installs the appropriate files. It installed fine on my x86 OS6.6.0 system. It should install on ARM 6.6.0 and may install on older X86 6.x, but I have not tried it. Instructions for installing on earlier ARM OS6 can be found here: https://www.andrewmunsell.com/blog/remote-access-to-readynas-zerotier-one/. If it were to run on OS4.x or 5.x, it would probably also need to be compiled and scripts manually installed as described on that page. If it works on OS4 and OS5, it would be the answer to the lack of ReadyNAS Remote and ReadyCloud compatibility on the same client machine. But even if it doesn't, ZeroTier, unlike ReadyCloud, is compatible with running ReadyNAS Remote on a PC, so you could have concurrent ways to access both old and new systems, though not between each other. Once installed, it's just a mater of using the zerotier-cli command or Windows/Mac/Android/iOS GUI to join all devices to the same network and get an IP address on that network. ip addr show now now shows a new zto: interface and (if connected to a network), the IP address associated wih it. The interface and network connections survive a reboot, courtesy of startup scripts installed by the ZeroTier installer. It was not necessary for me to change any configuration on my router. Note that uninstalling may be more difficult than installing, as there is no uninstall script. But you can leave it installed but disconnected form any networks and it should cause no problem. Please share your installation experience, good or bad, especially if not on an OS6.6.0 or above X86 system.14KViews4likes13CommentsVPN gateway to gateway SRX5308 IPsec SA Established but no traffic
I have 2 srx5308 last firmware upgrated. i I have two SRX5308 connected gateway to gateway, connect IPsec SA Established but do no traffic. One of them runs the trafficbut the arrive to lan destiantion, if i can tray to monitoring--> ping the result is filed and i can tray Tracerute--> filed I attacced the log: ONE the make traffic: Mon Oct 09 18:29:25 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.88.99.194 ->195.100.200.194 with spi=235890753(0xe0f6841) Mon Oct 09 18:29:25 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.223.231.194->195.88.99.194 with spi=45451481(0x2b588d9) Mon Oct 09 18:29:25 2017 (GMT +0200): [SRX5308] [IKE] INFO: Initiating new phase 2 negotiation: 195.88.99.194 [0]<=>195.223.231.194[0] Mon Oct 09 18:29:25 2017 (GMT +0200): [SRX5308] [IKE] INFO: Configuration found for 195.223.231.194. Mon Oct 09 18:29:25 2017 (GMT +0200): [SRX5308] [IKE] INFO: Configuration found for 195.223.231.194. Mon Oct 09 18:29:25 2017 (GMT +0200): [SRX5308] [IKE] INFO: Using IPsec SA configuration: 10.1.10.0/24<->10.2.10.0/24 Mon Oct 09 18:29:08 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] Purged IPsec-SA with proto_id=ESP and spi=198068733(0xbce49fd). Mon Oct 09 18:29:08 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] Purged IPsec-SA with proto_id=ESP and spi=162319720(0x9accd68). Mon Oct 09 18:29:08 2017 (GMT +0200): [SRX5308] [IKE] INFO: an undead schedule has been deleted: 'pk_recvupdate'. Mon Oct 09 18:29:03 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.88.99.194 ->195.100.200.194 with spi=162319720(0x9accd68) Mon Oct 09 18:29:03 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.223.231.194->195.88.99.194 with spi=198068733(0xbce49fd) Mon Oct 09 18:29:03 2017 (GMT +0200): [SRX5308] [IKE] INFO: Initiating new phase 2 negotiation: 195.88.99.194 [0]<=>195.223.231.194[0] Mon Oct 09 18:29:03 2017 (GMT +0200): [SRX5308] [IKE] INFO: Configuration found for 195.223.231.194. Mon Oct 09 18:29:03 2017 (GMT +0200): [SRX5308] [IKE] INFO: Configuration found for 195.223.231.194. Mon Oct 09 18:29:03 2017 (GMT +0200): [SRX5308] [IKE] INFO: Using IPsec SA configuration: 10.1.10.0/24<->10.2.10.0/24 Mon Oct 09 18:29:02 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] Purged IPsec-SA with proto_id=ESP and spi=31270826(0x1dd27aa). Mon Oct 09 18:29:02 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] Purged IPsec-SA with proto_id=ESP and spi=128931250(0x7af55b2). Mon Oct 09 18:29:02 2017 (GMT +0200): [SRX5308] [IKE] INFO: an undead schedule has been deleted: 'pk_recvupdate'. SECOND firewall no-traffic: Mon Oct 09 18:30:51 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.88.99.194->195.88.99.194- with spi=45451481(0x2b588d9) Mon Oct 09 18:30:51 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.88.99.194-->195.88.99.194 with spi=235890753(0xe0f6841) Mon Oct 09 18:30:51 2017 (GMT +0200): [SRX5308] [IKE] INFO: Using IPsec SA configuration: 10.2.10.0/24<->10.1.10.0/24 Mon Oct 09 18:30:51 2017 (GMT +0200): [SRX5308] [IKE] INFO: Responding to new phase 2 negotiation: 195.88.99.194[0]<=>195.88.99.194-[0] Mon Oct 09 18:30:33 2017 (GMT +0200): [SRX5308] [IKE] INFO: Phase 2 sa deleted 195.88.99.194-195.88.99.194- Mon Oct 09 18:30:33 2017 (GMT +0200): [SRX5308] [IKE] INFO: Sending Informational Exchange: delete payload[] Mon Oct 09 18:30:33 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] Flushing SAs for peer "195.88.99.194-" with spi 198068733 Mon Oct 09 18:30:29 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.88.99.194->195.88.99.194- with spi=198068733(0xbce49fd) Mon Oct 09 18:30:29 2017 (GMT +0200): [SRX5308] [IKE] INFO: [IPSEC_VPN] IPsec-SA established: ESP/Tunnel 195.88.99.194-->195.88.99.194 with spi=162319720(0x9accd68) Mon Oct 09 18:30:29 2017 (GMT +0200): [SRX5308] [IKE] INFO: Using IPsec SA configuration: 10.2.10.0/24<->10.1.10.0/24 Mon Oct 09 18:30:29 2017 (GMT +0200): [SRX5308] [IKE] INFO: Responding to new phase 2 negotiation: 195.88.99.194[0]<=>195.88.99.194-[0] Mon Oct 09 18:30:28 2017 (GMT +0200): [SRX5308] [IKE] INFO: Phase 2 sa deleted 195.88.99.194-195.88.99.194- Mon Oct 09 18:30:28 2017 (GMT +0200): [SRX5308] [IKE] INFO: Sending Informational Exchange: delete payload[ Mon Oct 09 16:30:28 2017 (GMT +0000): [SRX5308] [IKE] INFO: [IPSEC_VPN] Flushing SAs for peer "195.88.99.194-" with spi 31270826 grazie mille2.3KViews0likes3CommentsNeed help setting up site to site VPN. Nothing works.
I've gone through every tutorial I can find online along with following every bit of documentation and I still cannot get site to site VPN working between these two identical routers. Both sites have static IPs. Is anyone available to help me out? Thanks!1.4KViews0likes2CommentsFVS336Gv3 PPTP VPN for macOS Sierra
Hi Netgear community, One of our sites has a NETGEAR ProSafe™ Gigabit Dual WAN SSL VPN Firewall FVS336Gv3 which has PPTP Server enabled and setup with working users for Windows OS, there is 1 user that uses MAC OS. Since that 1 user upgraded their macOS to Sierra the option for PPTP has been removed (Apple reports the reason is for security). I have tried enabling SSLVPN in the firewall but have struggled to get that working. As a fallback, we are looking at 3rd party clients that can create the VPN using PPTP again. I've looked at some suggested clients (FlowVPN, VPN Tracker, user is trying TunnelBlick) but not getting very far. Ideally, we want a freeware that can do PPTP (unless there is a free SSLVPN option). Any suggestions or if you have got around this issue with macOS Sierra. Many thanks in advance.6.6KViews0likes10CommentsIs there a good explanation of vpn options?
I am working my way through setiing up a VPN tunnel, and I am a bit stymied by the whole process. Is there a good explanation somewhere how this all works on my netgear router? Let's take for example L2TP. When I try to set that up, there are IKE policies, VPN policies, User setups, there is a VPN Wizard, etc. Nowhere can I find an explanation what I need or what is necessary or where the pitfalls are. For example, I have to select FQDN but then have to enter 0.0.0.0? That doesn't make sense. How does this all fit together? What are the dependencies? For example, I have set up an L2TP user. So, if I connect with the right credentials, what is next? VPN pilicies? IKE policies? When I look at the VPN policies, I see that I can select an "Auto Policy", but then at the bottom I can (have to?) selct an IKE policy. What's more, I can select various parameters that seem to duplicate in the VPN policy and the IKE policy. I admit that it is probably my lack of understanding that gets me in trouble, and that is why I am asking if there is a good explanation of all these different options and how they all intract to get to a stable and efficient VPN connection. Appreciate any help.3KViews0likes2CommentsFVS336Gv3 - L2TP/IPsec on Windows 10
I have a Windows Server running RRAS with PPTP. The FVS forwards this with no problem. The problem is we now need to move to L2TP. I have created this on the Windows server, and from within the LAN, a client machine (my laptop) can connect directly to the server(using the internal server name). But as soon as I go outside the network it doesn't work (using external address). We do have a site to site IP SEC VPN running between this FVS and one in another site. I hope this isn't causing the problem?? I have forwarded UDP 500, 4500, 1701 and pretty much every other port in desperation. I have enabled L2TP Passthrough. I have made sure the external address is pingable. I have upgraded the firmware today to 4.3.4-1. Any suggestions greatfully welcome! thanks, Arron7.1KViews0likes9Comments