Virtual Private Networks (VPN)
IPsec
IX20 User Guide
270
13. Click to expand
Authentication
.
a. For
Authentication type
, select one of the following:
n
Pre-shared key
: Uses a pre-shared key (PSK) to authenticate with the remote
peer.
i. Type the
Pre-shared key
.
n
RSA signature
: Uses a private RSA key to authenticate with the remote peer.
i. For
Private key
, paste the device's private RSA key in PEM format.
ii. Type the
Private key passphrase
that is used to decrypt the private key.
Leave blank if the private key is not encrypted.
iii. For
Peer public key
, paste the peer's public RSA key in PEM format.
n
X.509 certificate
: Uses private key and X.509 certificates to authenticate with the
remote peer.
i. For
Private key
, paste the device's private RSA key in PEM format.
ii. Type the
Private key passphrase
that is used to decrypt the private key.
Leave blank if the private key is not encrypted.
iii. For
Certificate
, paste the local X.509 certificate in PEM format.
iv. For Peer verification, select either:
l
Peer certificate
: For
Peer certificate
, paste the peer's X.509 certificate in
PEM format.
l
Certificate Authority
: For
Certificate Authority chain
, paste the
Certificate Authority (CA) certificates. These must include all peer
certificates in the chain up to the root CA certificate, in PEM format.
14. (Optional) For
Management Priority
, set the priority for this IPsec tunnel.
15. (Optional) To configure the device to connect to its remote peer as an XAUTH client:
a. Click to expand
XAUTH client
.
b. Click
Enable
.
c. Type the
Username
and
Password
that the device will use to authenticate as an
XAUTH client with the peer.
16. (Optional) Click
Enable MODECFG client
to receive configuration information, such as the
private IP address, from the remote peer.