Configuring a DPD detector ··························································································································· 208
Displaying and maintaining IKE ····················································································································· 209
IKE configuration examples ··························································································································· 209
Troubleshooting IKE ······································································································································ 216
Invalid user ID ········································································································································ 216
Proposal mismatch ································································································································· 217
ACL configuration error ·························································································································· 218
Configuring IKEv2 ······················································································· 219
Overview ························································································································································ 219
New features in IKEv2 ···························································································································· 219
Protocols and standards ························································································································ 220
IKEv2 configuration task list ··························································································································· 220
Configuring an IKEv2 proposal ······················································································································ 223
Configuring an IKEv2 policy ··························································································································· 223
Configuring an IKEv2 keyring ························································································································ 224
Configuring an IKEv2 profile ·························································································································· 225
IKEv2 configuration examples ······················································································································· 227
Troubleshooting IKEv2 ··································································································································· 240
Configuring PKI ··························································································· 241
Overview ························································································································································ 241
PKI terminology ······································································································································ 241
PKI architecture ······································································································································ 242
PKI operation ········································································································································· 242
PKI applications ····································································································································· 243
FIPS compliance ············································································································································ 243
PKI configuration task list ······························································································································· 243
Configuring an entity DN ································································································································ 244
Configuring a PKI domain ······························································································································ 245
Requesting a PKI certificate ··························································································································· 246
Verifying PKI certificates ································································································································ 249
Deleting a certificate ······································································································································ 251
Displaying and maintaining PKI ····················································································································· 252
PKI configuration examples ··························································································································· 252
vi
Need help?
Do you have a question about the FlexNetwork MSR Series and is the answer not in the manual?