Identifying Branch Offices With Certificates; Ipsec Authentication - Nortel NN46110-600 User Manual

Vpn router security — servers, authentication, and certificates
Table of Contents

Advertisement

94 Chapter 3 Using certificates

Identifying branch offices with certificates

You use the Authentication section of the Profiles > Branch Office > Edit
Connection window to configure the authentication between the local and remote
branch office VPN Routers. The fields that appear in this window depend on
whether you are using an IPsec, PPTP, or L2TP tunnel type.
Select the authentication method that you want to use for the branch office
connection from the list.

IPsec authentication

In the Authentication section, complete the following information:
1
2
3
4
NN46110-600
Note: When you change the authentication type, the window
immediately changes to reflect the requirements of the new
authentication method. Any changes that you made on the
Authentication part of the previous window are lost.
Enter the pre-shared key as a text or hex string. This is an alphanumeric text
or hexadecimal string used for authentication between the local and remote
branches. For authentication to occur, you must use the same pre-shared string
on both the local and remote branch offices.
Certificates are associated with each endpoint VPN Router and allow for
mutual authentication between two connections. The Certificate section
includes information about the remote branch office system, the authority that
issued the certificate, and the certificate identification.
Remote Identity is the name of the remote peer initiating the tunnel
connection. You can use either a subject distinguished name (subject DN) or a
subject alternative name to uniquely identify the remote branch office system.
Specifying both a full subject DN and a subject alternative name on this
window allows the remote peer to use either identity form when making a
connection.
Select a valid issuer CA from the certificate authority list. This CA is the
issuer of the remote peer's certificate or a higher-level CA in the remote peer's
certificate hierarchy. The CA must have the trusted flag set on the Certificates
window. If a CA hierarchy is used, you must import all intermediary CAs
below the trusted CA to the VPN Router. These certificate authorities are

Advertisement

Table of Contents
loading

Table of Contents