Motorola WiNG 5.6 Reference Manual page 416

Access point
Table of Contents

Advertisement

5 - 330 WiNG 5.6 Access Point System Reference Guide
5. In Step 2 screen, configure the following parameters:
Peer
Authentication
Local Identity
Remote Identity
IKE Policy
Figure 5-217 VPN Step-By-Step Wizard - Step 2
Select the type of peer for this device when forming a tunnel. Peer information can be either
IP Address or Host Name. Provide the IP address or the hostname of the peer device.
Configure how the devices authenticate with each other.
• Certificate – The devices use certificates to validate credentials.
• Pre-Shared Key – The devices use pre-shared key to authenticate.
Configure the local identity for the VPN Tunnel.
• IP Address – The local identity is an IP address.
• FQDN – The local identity is a Fully Qualified Domain Name (FQDN).
• Email – The local identity is an E-mail address.
Configure the remote identity for the VPN Tunnel.
• IP Address – The remote identity is an IP address.
• FQDN – The remote identity is a Fully Qualified Domain Name (FQDN).
• Email – The remote identity is an E-mail address.
Configure the IKE policy to use when creating this VPN Tunnel. The following options are
available:
• Use Default – Click this option to use the default IKE profiles. Select one of ike1-default or
ike2-default.
• Create new Policy – Click this option to create a new IKE policy.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents