Motorola WiNG 5.5 Reference Manual page 195

Table of Contents

Advertisement

11. Select either the
IKEv1
or
12. Refer to the following to determine whether a VPN
Name
IP/Hostname
Authentication Type
LocalID
RemoteID
IKE Policy Name
13. Select
Add
to define a new peer configuration,
peer configuration. The parameters that can de defined for the peer configuration vary depending on whether IKEv1 or IKEv2
was selected.
Figure 5-63 Profile Security - VPN Peer Configuration create/modify screen (IKEv2 example)
Name
IKEv2
radio button to enforce VPN key exchanges using either IKEv1 or IKEv2.
Peer Configuration
Lists the 32 character maximum name assigned to each listed peer configuration.
Displays the IP address (or host address FQDN) of the IPSec VPN peer targeted for secure
tunnel connection and data transfer.
Lists whether the peer configuration has been defined to use pre-shared key (PSK) or RSA.
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It's the first
algorithm known to be suitable for signing, as well as encryption. If using IKEv2, this screen
displays both local and remote authentication, as both ends of the VPN connection require
authentication.
Lists the access point's local identifier used within this peer configuration for an IKE
exchange with the target VPN IPSec peer.
Displays the means the target remote peer is to be identified (string, FQDN etc.) within the
VPN tunnel.
Lists the IKEv1 or IKE v2 policy used with each listed peer configuration. If a policy requires
creation, select the Create button.
Edit
to modify an existing configuration or
If creating a new peer configuration (remote gateway) for VPN tunnel connection,
assign it a name (32 character maximum) to distinguish it from others with similar
attributes.
Device Configuration 5 - 109
requires creation, modification or removal:
Delete
to remove an existing

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents