Motorola WiNG 5.6 Reference Manual page 218

Access point
Table of Contents

Advertisement

5 - 132 WiNG 5.6 Access Point System Reference Guide
IP Type
Authentication Type or
Local Authentication
Type
Authentication Value
or
Local Authentication
Value
Local Identity
Remote Identity
IKE Policy Name
14. Select
OK
to save the changes made within the
configuration.
15. Select the
Transform Set
Create or modify
that needs to be protected.
Enter either the IP address or FQDN hostname of the IPSec VPN peer used in the tunnel
setup. If IKEv1 is used, this value is titled IP Type, if IKEv2 is used, this parameter is titled
Select IP/Hostname.
Select either pre-shared key (PSK) or RSA. Rivest, Shamir, and Adleman (RSA) is an
algorithm for public key cryptography. It's the first algorithm known to be suitable for
signing, as well as encryption If using IKEv2, this screen displays both local and remote
authentication options, as both ends of the VPN connection require authentication. RSA
is the default value for both local and remote authentication (regardless of IKEv1 or
IKEv2).
Define the authentication string (shared secret) that must be shared by both ends of the
VPN tunnel connection. The string must be from 8 - 21 characters long. If using IKEv2,
both a local and remote string must be specified for handshake validation and both ends
(local and remote) of the VPN connection.
Select the access point's local identifier used with this peer configuration for an IKE
exchange with the target VPN IPSec peer. Options include IP Address, Distinguished
Name, FQDN, email and string. The default setting is string.
Select the access point's remote identifier used with this peer configuration for an IKE
exchange with the target VPN IPSec peer. Options include IP Address, Distinguished
Name, FQDN, email and string. The default setting is string.
Select the IKEv1 or IKE v2 policy name (and settings) to apply to this peer configuration.
If a policy requires creation, select the Create icon.
tab.
Transform Set
configurations to specify how traffic is protected within crypto ACL defining the traffic
Peer Configuration
screen. Select
Reset
to revert to the last saved

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents