Motorola WiNG 5 System Reference Manual page 158

Table of Contents

Advertisement

5 - 98 WiNG 5 Access Point System Reference Guide
11. Select either the
12. Refer to the following to determine whether a new VPN
configuration requires modification or a configuration requires removal.
Name
IP/Hostname
Authentication Type
LocalID
RemoteID
IKE Policy Name
Figure 5-50 Profile Security - VPN Peer Destination screen (IKEv1 example)
IKEv1
or
IKEv2
radio button to enforce VPN key exchanges using either IKEv1 or IKEv2.
Lists the 32 character maximum name assigned to each listed peer
configuration upon creation.
Displays the IP address (or host address FQDN) of the IPSec VPN peer
targeted for secure tunnel connection and data transfer.
Lists whether the peer configuration has been defined to use pre-shared key
(PSK) or RSA. Rivest, Shamir, and Adleman (RSA) is an algorithm for public
key cryptography. It's the first algorithm known to be suitable for signing, as
well as encryption. If using IKEv2, this screen displays both local and remote
authentication, as both ends of the VPN connection require authentication.
Lists the access point's local identifier used within this peer configuration for
an IKE exchange with the target VPN IPSec peer.
Displays the means the target remote peer is to be identified (string, FQDN
etc.) within the VPN tunnel.
Lists the IKEv1 or IKE v2 policy used with each listed peer configuration. If a
policy requires creation, select the Create button.
Peer Configuration
requires creation, an existing

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents